Skip to main content
Log in

Cover selection technique for secure transform domain image steganography

  • Original Article
  • Published:
Iran Journal of Computer Science Aims and scope Submit manuscript

Abstract

In image steganography, an appropriate cover selection offers the least detectable stego image thereby assuring the security of covert communication. In this paper, a new framework is proposed for the optimal choice of cover from the image database based on statistical texture analysis. Texture analysis using a gray level co-occurrence matrix (GLCM) and run-length matrix (RLM) helps to identify the heterogeneity of images. Textural features were extracted and a non-linear support vector machine was employed to classify a suitable cover from image database. This can further be used as a host image to carry the secret message for the image steganography scheme. To justify the validity of the proposed cover selection technique, image steganography algorithm based on double density dual tree DWT (DDDTDWT) and LU decomposition is also proposed in this work. Performance measures like imperceptibility, robustness, and steganalyser’s inability to detect the stego image were employed to check validity of the proposed schemes. Better imperceptibility, strong robustness to stego attacks, and poor detection accuracy by steganalyser confirms the efficacy of proposed cover selection and transform domain image steganography techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. Int. J. Inf. Hiding Multimed. Signal Process. 2, 142–172 (2011)

    Google Scholar 

  2. Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: A survey. Comput. Sci. Rev. 13–14, 95–113 (2014)

    Article  Google Scholar 

  3. Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft. Comput. 19(11), 3331–3339 (2015)

    Article  Google Scholar 

  4. Shirafkan, M.H., Akhtarkavan, E., Vahidi, J.: A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed Solomon encoding. In: \(2^{nd}\) International conference on knowledge based engineering and innovation (2015)

  5. Gulve, A.K., Joshi, M.S.: An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach. In: Hindawi Mathematical Problems in Engineering volume 2015, Article ID 684824

  6. Rabie, T., Kamel, I., : Multimed Tools Appl. (2016). https://doi.org/10.1007/s11042-016-3301-x

  7. Pramanik, S., Singh, R.P., Ghosh, R.: Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. In: Multimedia Tools and Applications https://doi.org/10.1007/s11042-020-08676-1

  8. Ayub, N., Selwal, A.: An improved image steganography technique using edge based data hiding in DCT domain. J. Interdiscip. Math. 23(2), 357–366 (2020). https://doi.org/10.1080/09720502.2020.1731949

    Article  Google Scholar 

  9. Jamel, E.M., Ena Muzzafer Jamel: Secure Image Steganography Using Biorthogonal Wavelet Transform. J. Eng. Appl. Sci. 14, 9396–9404 (2019)

    Article  Google Scholar 

  10. Subhedar, M.S., Mankar, V.H.: Performance Evaluation of Image Steganography Based on Cover Selection and Contourlet Transform. In: International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (CUBE) (2013) https://doi.org/10.1109/CUBE.2013.39

  11. Sajedi, H., Jamzad, M.: Adaptive Steganography Method Based on Contourlet Transform In: \(9^th\) International Conference on Signal Processing (2008). https://doi.org/10.1109/ICOSP.2008.4697237

  12. Hajduk, V., Broda, M., Kova, O., Levicky, D.: Image steganography with using QR code and cryptography. In: \(26^{th}\) conference on Radio elektronika (2016)

  13. Sajedi, H., Jamzad, M.: Cover selection steganography method based on similarity of image blocks In: Proc. of IEEE \(8^{th}\) CIT Conference, Sydney, 379 - 384 (2008)

  14. Sun, Y., Liu, F.: Selecting cover for image steganography by correlation coefficient. In: Proceedings of Second International Workshop on Education Technology and Computer Science, 2, 159 - 162 (2010)

  15. Kharrazi, M., Sencar, H.T., Memon, N.: Cover selection for steganographic embedding. IEEE International Conference on Image Processing. 117–121, (2006)

  16. Sajedi, H., Jamzad, M.: 2010 Using contourlet transform and cover selection for secure steganography. Int. J. Inf. Secur. 9, 337–352 (2010). https://doi.org/10.1007/s10207-010-0112-3

    Article  Google Scholar 

  17. Wu, S., Liu, Y., Zhong, S., Liu, Y.: What Makes the Stego Image Undetectable? In: Proceedings of the \(7^{th}\) International Conference on Internet Multimedia Computing and Service Article No. 47 (2015)

  18. Yuan, J., Chen, H.: Embedding Suitability Adaptive Cover Selection for Image Steganography. In: International Conference on e-Education, e-Business and Information Management. https://doi.org/10.2991/iceeim-14.2014.11 (2014)

  19. Selesnick, I.W., Baraniuk, R.G., Kingsbury, Nick G.: The Dual Tree Complex Wavelet Transform. In: IEEE Signal Processing Magazine (2005)

  20. Selesnick, I.W.: The Double Density DWT: In: Wavelets in Signal and Image Analysis: From Theory to Practice (2001)

  21. Selesnick, I.W.: The double density dual tree DWT. IEEE Trans. Signal Process. 52(5), 1304–1314 (2004)

    Article  MathSciNet  Google Scholar 

  22. Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC 3(6), 610–621 (1973)

    Article  Google Scholar 

  23. Galloway, M.M.: Texture Analysis Using Gray Level Run Lengths. Comput. Graph. Image Process. 4, 172–179 (1975)

    Article  Google Scholar 

  24. Chu, A., Sehgal, C.M., Greenleaf, J.F.: Use of Gray Value Distribution of Run Lengths for Texture Analysis. Pattern Recognit. Lett. 11, 415–420 (1990)

    Article  Google Scholar 

  25. USC-SIPI. (1997). http://sipi.usc.edu/database

  26. http://www.cs.washington.edu/research/imagedatabase

  27. http://vismod.media.mit.edu/pub/VisTex

  28. Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines 2578, 340–354 (2003)

  29. Sajedi, H., Jamzad, M.: CBS: Contourlet-based steganalysis method. J. Signal Process. Syst. 61, 367–373 (2010)

    Article  Google Scholar 

  30. Schaefer, G., Stich, M.: UCID - an uncompressed colour image database Proceedings of Storage and Retrieval Methods and Applications for Multimedia. 5307, 472–480 (2004)

  31. Nazari, S.: Cover Selection Steganography Via Run Length Matrix and Human Visual System. J. Inf. Syst. Telecommun. 1(2), 131–138 (2003)

    Google Scholar 

  32. Thabit, R., Khoo, B.E.: A new robust lossless data hiding scheme and its application to color medical images. Digit. Signal Proc. 38, 77–94 (2015)

    Article  Google Scholar 

  33. Kanan, H.R., Nazeri, B.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14), 6123–6130 (2014)

    Article  Google Scholar 

  34. Xiao, Moyan, He, Zhibiao: High capacity image steganography method based on framelet and compressive sensing. In: Proceedings of SPIE, Multispectral Image Acquisition, Processing, and Analysis, vol. 9811, p. 98110Y (2015)

  35. Subhedar, M.S., Mankar, VH.: Image steganography using redundant discrete wavelet transform and QR factorization. In: Computers & Electrical Engineering (2016) https://doi.org/10.1016/j.compeleceng.2016.04.017

  36. Sharma, V., Srivastava, D., Mathur, P.: A Daubechies DWT Based Image Steganography Using Smoothing Operation. Int. Arab. J. Inf. Technol. 17(2), (2020)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mansi S. Subhedar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Subhedar, M.S. Cover selection technique for secure transform domain image steganography. Iran J Comput Sci 4, 241–252 (2021). https://doi.org/10.1007/s42044-020-00077-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42044-020-00077-9

Keywords

Navigation