Abstract
The main objective is to design a robust algorithm which can hide multiple target bits without direct replacement of the bits of cover image and at the same time maintain perceptibility of carrier medium by reducing the distortion rate by intensity adjustment. The method uses the strength of modular arithmetic for embedding target data and at the same time able to solve the overlapping problem. In this double layer security technique first the target bits are converted into another number system and then these converted digits are embedded by adjusting the pixel intensities in such a way so that modulo operation retrieve data correctly at the receiver side. The proposed technique is tested on different class of images and analyzed based on different parameters. The histograms are distorted significantly for more than four bit insertion and the average PSNR is 34.7 for four multi-bit insertion with 100% payload. Different standard LSB detectors like SP, WS etc. are fail to detect hidden bits and at the same time the statistical attack on stego media unable to get success on stego images. The performance of the proposed technique is measured by Stirmark Benchmark 4.0 whereas the security strength is calculated through KL divergence which establishes it as a more secure algorithm. The Average Embedding Capacity of this technique is four. The work shows better performances than many state-of-the-art-works. The method reduces the distortion rate to half of the standard multi-bit LSB technique. This helps to retain imperceptibility with the increase of capacity through multi-bit insertion. The robustness is introduced in this spatial domain technique by embedding target data without direct replacement of cover bits. This algorithm uses the NP-complete nature of modulo operation to increase security and at the same time introduces parallelism to reduce time complexity.
Similar content being viewed by others
References
Andreas W, Pfitzmann A (1999) Attacks on steganographic systems In: Proc. of 3rd International workshop on information hiding, September 1999, pp 61–76
Aryal A, Motegi K, Imaizumi S, Aoki N (2015) Improvement of multi-bit information embedding algorithm for palette-based images. In: Lopez J, Mitchell C (eds) Information Security. ISC 2015. Lecture Notes in Computer Science, vol 9290. Springer, Cham
Asai H (1976) A recursive radix conversion formula and its application to multiplication and division. Elsevier Journal of Computers & Mathematics with Applications 2(3–4):255–265
Bailey K, Curran K (2006) An evaluation of image based steganography methods. Journal of Multimedia Tools and Applications 30(1):55–88
Bergman M (2016) It’s Hard to Get Good (Security) Help These Days. IEEE Consumer Electronics Magazine 5(3):132–133
Boute RT (1992) The Euclidean definition of the functions div and mod. ACM Trans Program Lang Syst (TOPLAS) (ACM Press (New York, NY, USA)) 14(2):127–144
Brent RP, Zimmermann P (2010) Modern Computer Arithmetic, Cambridge Monographs on Computational and Applied Mathematics (No. 18). Cambridge University Press, Cambridge, pp 236
Cachin C (2004) An information theoretic model for steganography. Inf Comput 192:41–56
Cha S–H, Srihari SN (2002) On measuring the distance between histograms. Pattern Recognition, the Journal of Pattern Recognition Society 35:1355–1370
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727–752
Chugh G, Yadav R, Saini R (2014) A New Image Steganographic Approach Based on Mod Factor for RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition 7(3):27–44
Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB Steganography via Sample Pair Analysis. In: the Proc. of 5th Information Hiding Workshop, Vol 2578, pp 355–372
Dumitrescu D, Stan IM, Simion E (2017) Steganography techniques, IACR Cryptology ePrint Archive (2017). Available at: https://eprint.iacr.org/2017/341.pdf. Accessed 16th April 2018
Feng B, Lu W, Sun W (2015) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Transactions on Information Forensics and Security 10(2):243–255
Fridrich J, Kodovsk J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444
Gonzalez RC, Woods RE (2002) Digital Image Processing (2nd ed). Prentice Hall, India
Hussain M, Wahab AWA, Javed N, Jung KH (2016) Recursive information hiding scheme through LSB, PVD shift, and MPE. IETE Tech Rev J 35(1):1–11
Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur, Springer 8:1–14
Ker AD (2007) Optimally weighted least-squares steganalysis. In: Delp Edward J., Wong P. W., (eds) Proc. of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX 6505, pp 16. https://doi.org/10.1117/12.704606
Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. In: Proc. SPIE, Vol 6819, pp 5–17
Kuo W-C, Kuo S-H, Wu L-C (2015) Multi-Bit Data Hiding Scheme for Compressing Secret Messages. Applied Sciences Journal 5(4):1033–1049
Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging ‘99 Security and Watermarking of Multimedia Contents 3657:219–239
Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2017) A Novel Data Hiding Algorithm for High Dynamic Range Images. IEEE Transactions on Multimedia 19(1):196–211
Luo W, Huang F, Huang J (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214
Modular Arithmetic-Cryptographer's Mathematics. Available at: http://www2.sunysuffolkedu/fultonj/MA22/Modular%20Arithmetic%20&%20Cryptography.pdf
Mukherjee I, Paul G (2013) Efficient Multi-bit Image Steganography in Spatial Domain. Information Systems Security, Springer, LNCS, Chapter 29, vol 8303, pp 270–284
Nguyen BC, Yoon SM, Lee HK (2006) Multi Bit Plane Image Steganography. IWDW, LNCS 4283, pp 61–70
Paul G, Davidson I, Mukherjee I, Ravi SS (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 75(5):1–27
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information Hiding - A Survey. In: Proc. of the IEEE, special issue protection of multimedia content, vol 87, no. 7, pp 1062–1078
Pevny T, Filler T, Bas P (2010) Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. Information Hiding, Springer, LNCS, Berlin, Chapter 20, vol 6387, pp 161–177
Prashanti G, Sandhyarani K (2015) A New Approach for Data Hiding with LSB Steganography. Advances in Intelligent Systems and Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 70, vol 338, pp 423–430
Pund-Dange S, Desai CG (2017) Data Hiding Technique using Catalan-Lucas Number Sequence. Indian Journal of Science and Technology 10(4):1–6
Rajopadhye S. Number Systems and Radix Conversion. Available at: www.cs.colostate.edu/~cs270/.Spring12/Notes/NumberSystems
Sedighi V, Fridrich J, Cogranne R (2015) Content Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. In: Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol 9409, San Francisco, CA
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Shu X, Zhang J, Yao DD, Feng WC (2016) Fast Detection of Transformed Data Leaks. IEEE Transactions on Information Forensics and Security 11:528–542
Singh S, Attri VK (2015) State-of-the-art Review on Steganographic Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition 8(7):161–170
Stanley CA Pairs of Values and the Chi-squaredAttack. Available at: orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf
Test Images, DECSAI image Database, Available at: http://decsai.ugr.es/cvg/dbimagenes/
The information hiding homepage, “Photo Database”, Available at: http://www.petitcolas.net/watermarking/image_database
The Quotient Remainder Theorem. Available at: https://www.khanacademy.org/computing/computerscience/cryptography/modarithmetic/a/the-quotient-remainder-theorem
USC-SIPI Image Database, Vol. 3: Miscellaneous. Available at http://sipi.usc.edu/database/
Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications 34(2):142–151
Vatai E Discrete mathematics I-Number theory Congruence. Available at: http://compalg.inf.elte.hu/~vatai/dm1enorg/l07-congruences.pdf
Wang S–J (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Math Comput 164:99–116
Wang C–M, Wu N-I, Tsai C-S, Hwang M-S (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158
Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251–1263
Xie L, Zhu L, Chen G (2016) Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval. Multimedia Tools and Applications 75(15):9185–9204
Yang C-Y, Wang W–F (2015) Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. Genetic and Evolutionary Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 43, Vol. 329, pp 145–154
Zhu L, Jin H, Zheng R, Feng X (2014) Effective naive Bayes nearest neighbor based image classification on GPU. J Supercomput 68(2):820–848
Zhu L, Shen J, Xie L (2015) Topic Hypergraph Hashing for Mobile Image Retrieval. In: Proc. of the 23rd ACM International Conference on Multimedia, Australia, pp 843–846
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Datta, B., Roy, S., Roy, S. et al. Multi-bit robust image steganography based on modular arithmetic. Multimed Tools Appl 78, 1511–1546 (2019). https://doi.org/10.1007/s11042-018-6195-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6195-y