Skip to main content
Log in

Multi-bit robust image steganography based on modular arithmetic

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The main objective is to design a robust algorithm which can hide multiple target bits without direct replacement of the bits of cover image and at the same time maintain perceptibility of carrier medium by reducing the distortion rate by intensity adjustment. The method uses the strength of modular arithmetic for embedding target data and at the same time able to solve the overlapping problem. In this double layer security technique first the target bits are converted into another number system and then these converted digits are embedded by adjusting the pixel intensities in such a way so that modulo operation retrieve data correctly at the receiver side. The proposed technique is tested on different class of images and analyzed based on different parameters. The histograms are distorted significantly for more than four bit insertion and the average PSNR is 34.7 for four multi-bit insertion with 100% payload. Different standard LSB detectors like SP, WS etc. are fail to detect hidden bits and at the same time the statistical attack on stego media unable to get success on stego images. The performance of the proposed technique is measured by Stirmark Benchmark 4.0 whereas the security strength is calculated through KL divergence which establishes it as a more secure algorithm. The Average Embedding Capacity of this technique is four. The work shows better performances than many state-of-the-art-works. The method reduces the distortion rate to half of the standard multi-bit LSB technique. This helps to retain imperceptibility with the increase of capacity through multi-bit insertion. The robustness is introduced in this spatial domain technique by embedding target data without direct replacement of cover bits. This algorithm uses the NP-complete nature of modulo operation to increase security and at the same time introduces parallelism to reduce time complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

References

  1. Andreas W, Pfitzmann A (1999) Attacks on steganographic systems In: Proc. of 3rd International workshop on information hiding, September 1999, pp 61–76

  2. Aryal A, Motegi K, Imaizumi S, Aoki N (2015) Improvement of multi-bit information embedding algorithm for palette-based images. In: Lopez J, Mitchell C (eds) Information Security. ISC 2015. Lecture Notes in Computer Science, vol 9290. Springer, Cham

  3. Asai H (1976) A recursive radix conversion formula and its application to multiplication and division. Elsevier Journal of Computers & Mathematics with Applications 2(3–4):255–265

    Article  Google Scholar 

  4. Bailey K, Curran K (2006) An evaluation of image based steganography methods. Journal of Multimedia Tools and Applications 30(1):55–88

    Article  Google Scholar 

  5. Bergman M (2016) It’s Hard to Get Good (Security) Help These Days. IEEE Consumer Electronics Magazine 5(3):132–133

    Article  Google Scholar 

  6. Boute RT (1992) The Euclidean definition of the functions div and mod. ACM Trans Program Lang Syst (TOPLAS) (ACM Press (New York, NY, USA)) 14(2):127–144

    Article  Google Scholar 

  7. Brent RP, Zimmermann P (2010) Modern Computer Arithmetic, Cambridge Monographs on Computational and Applied Mathematics (No. 18). Cambridge University Press, Cambridge, pp 236

  8. Cachin C (2004) An information theoretic model for steganography. Inf Comput 192:41–56

    Article  MathSciNet  Google Scholar 

  9. Cha S–H, Srihari SN (2002) On measuring the distance between histograms. Pattern Recognition, the Journal of Pattern Recognition Society 35:1355–1370

    Article  Google Scholar 

  10. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727–752

    Article  Google Scholar 

  11. Chugh G, Yadav R, Saini R (2014) A New Image Steganographic Approach Based on Mod Factor for RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition 7(3):27–44

    Article  Google Scholar 

  12. Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB Steganography via Sample Pair Analysis. In: the Proc. of 5th Information Hiding Workshop, Vol 2578, pp 355–372

  13. Dumitrescu D, Stan IM, Simion E (2017) Steganography techniques, IACR Cryptology ePrint Archive (2017). Available at: https://eprint.iacr.org/2017/341.pdf. Accessed 16th April 2018

  14. Feng B, Lu W, Sun W (2015) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Transactions on Information Forensics and Security 10(2):243–255

    Article  Google Scholar 

  15. Fridrich J, Kodovsk J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444

    Article  Google Scholar 

  16. Gonzalez RC, Woods RE (2002) Digital Image Processing (2nd ed). Prentice Hall, India

  17. Hussain M, Wahab AWA, Javed N, Jung KH (2016) Recursive information hiding scheme through LSB, PVD shift, and MPE. IETE Tech Rev J 35(1):1–11

  18. Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur, Springer 8:1–14

    Google Scholar 

  19. Ker AD (2007) Optimally weighted least-squares steganalysis. In: Delp Edward J., Wong P. W., (eds) Proc. of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX 6505, pp 16. https://doi.org/10.1117/12.704606

  20. Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. In: Proc. SPIE, Vol 6819, pp 5–17

  21. Kuo W-C, Kuo S-H, Wu L-C (2015) Multi-Bit Data Hiding Scheme for Compressing Secret Messages. Applied Sciences Journal 5(4):1033–1049

    Article  Google Scholar 

  22. Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging ‘99 Security and Watermarking of Multimedia Contents 3657:219–239

    Google Scholar 

  23. Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2017) A Novel Data Hiding Algorithm for High Dynamic Range Images. IEEE Transactions on Multimedia 19(1):196–211

    Article  Google Scholar 

  24. Luo W, Huang F, Huang J (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214

    Article  Google Scholar 

  25. Modular Arithmetic-Cryptographer's Mathematics. Available at: http://www2.sunysuffolkedu/fultonj/MA22/Modular%20Arithmetic%20&%20Cryptography.pdf

  26. Mukherjee I, Paul G (2013) Efficient Multi-bit Image Steganography in Spatial Domain. Information Systems Security, Springer, LNCS, Chapter 29, vol 8303, pp 270–284

  27. Nguyen BC, Yoon SM, Lee HK (2006) Multi Bit Plane Image Steganography. IWDW, LNCS 4283, pp 61–70

  28. Paul G, Davidson I, Mukherjee I, Ravi SS (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 75(5):1–27

    Google Scholar 

  29. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information Hiding - A Survey. In: Proc. of the IEEE, special issue protection of multimedia content, vol 87, no. 7, pp 1062–1078

  30. Pevny T, Filler T, Bas P (2010) Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. Information Hiding, Springer, LNCS, Berlin, Chapter 20, vol 6387, pp 161–177

  31. Prashanti G, Sandhyarani K (2015) A New Approach for Data Hiding with LSB Steganography. Advances in Intelligent Systems and Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 70, vol 338, pp 423–430

  32. Pund-Dange S, Desai CG (2017) Data Hiding Technique using Catalan-Lucas Number Sequence. Indian Journal of Science and Technology 10(4):1–6

    Article  Google Scholar 

  33. Rajopadhye S. Number Systems and Radix Conversion. Available at: www.cs.colostate.edu/~cs270/.Spring12/Notes/NumberSystems

  34. Sedighi V, Fridrich J, Cogranne R (2015) Content Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. In: Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol 9409, San Francisco, CA

  35. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  Google Scholar 

  36. Shu X, Zhang J, Yao DD, Feng WC (2016) Fast Detection of Transformed Data Leaks. IEEE Transactions on Information Forensics and Security 11:528–542

    Article  Google Scholar 

  37. Singh S, Attri VK (2015) State-of-the-art Review on Steganographic Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition 8(7):161–170

    Article  Google Scholar 

  38. Stanley CA Pairs of Values and the Chi-squaredAttack. Available at: orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf

  39. Test Images, DECSAI image Database, Available at: http://decsai.ugr.es/cvg/dbimagenes/

  40. The information hiding homepage, “Photo Database”, Available at: http://www.petitcolas.net/watermarking/image_database

  41. The Quotient Remainder Theorem. Available at: https://www.khanacademy.org/computing/computerscience/cryptography/modarithmetic/a/the-quotient-remainder-theorem

  42. USC-SIPI Image Database, Vol. 3: Miscellaneous. Available at http://sipi.usc.edu/database/

  43. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications 34(2):142–151

    Article  Google Scholar 

  44. Vatai E Discrete mathematics I-Number theory Congruence. Available at: http://compalg.inf.elte.hu/~vatai/dm1enorg/l07-congruences.pdf

  45. Wang S–J (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Math Comput 164:99–116

    MathSciNet  MATH  Google Scholar 

  46. Wang C–M, Wu N-I, Tsai C-S, Hwang M-S (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158

    Article  Google Scholar 

  47. Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251–1263

    Article  Google Scholar 

  48. Xie L, Zhu L, Chen G (2016) Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval. Multimedia Tools and Applications 75(15):9185–9204

    Article  Google Scholar 

  49. Yang C-Y, Wang W–F (2015) Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. Genetic and Evolutionary Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 43, Vol. 329, pp 145–154

  50. Zhu L, Jin H, Zheng R, Feng X (2014) Effective naive Bayes nearest neighbor based image classification on GPU. J Supercomput 68(2):820–848

    Article  Google Scholar 

  51. Zhu L, Shen J, Xie L (2015) Topic Hypergraph Hashing for Mobile Image Retrieval. In: Proc. of the 23rd ACM International Conference on Multimedia, Australia, pp 843–846

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Biswajita Datta.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Datta, B., Roy, S., Roy, S. et al. Multi-bit robust image steganography based on modular arithmetic. Multimed Tools Appl 78, 1511–1546 (2019). https://doi.org/10.1007/s11042-018-6195-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6195-y

Keywords

Navigation