Abstract
In image steganography, an appropriate cover selection offers the least detectable stego image thereby assuring the security of covert communication. In this paper, a new framework is proposed for the optimal choice of cover from the image database based on statistical texture analysis. Texture analysis using a gray level co-occurrence matrix (GLCM) and run-length matrix (RLM) helps to identify the heterogeneity of images. Textural features were extracted and a non-linear support vector machine was employed to classify a suitable cover from image database. This can further be used as a host image to carry the secret message for the image steganography scheme. To justify the validity of the proposed cover selection technique, image steganography algorithm based on double density dual tree DWT (DDDTDWT) and LU decomposition is also proposed in this work. Performance measures like imperceptibility, robustness, and steganalyser’s inability to detect the stego image were employed to check validity of the proposed schemes. Better imperceptibility, strong robustness to stego attacks, and poor detection accuracy by steganalyser confirms the efficacy of proposed cover selection and transform domain image steganography techniques.
Similar content being viewed by others
References
Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. Int. J. Inf. Hiding Multimed. Signal Process. 2, 142–172 (2011)
Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: A survey. Comput. Sci. Rev. 13–14, 95–113 (2014)
Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft. Comput. 19(11), 3331–3339 (2015)
Shirafkan, M.H., Akhtarkavan, E., Vahidi, J.: A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed Solomon encoding. In: \(2^{nd}\) International conference on knowledge based engineering and innovation (2015)
Gulve, A.K., Joshi, M.S.: An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach. In: Hindawi Mathematical Problems in Engineering volume 2015, Article ID 684824
Rabie, T., Kamel, I., : Multimed Tools Appl. (2016). https://doi.org/10.1007/s11042-016-3301-x
Pramanik, S., Singh, R.P., Ghosh, R.: Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. In: Multimedia Tools and Applications https://doi.org/10.1007/s11042-020-08676-1
Ayub, N., Selwal, A.: An improved image steganography technique using edge based data hiding in DCT domain. J. Interdiscip. Math. 23(2), 357–366 (2020). https://doi.org/10.1080/09720502.2020.1731949
Jamel, E.M., Ena Muzzafer Jamel: Secure Image Steganography Using Biorthogonal Wavelet Transform. J. Eng. Appl. Sci. 14, 9396–9404 (2019)
Subhedar, M.S., Mankar, V.H.: Performance Evaluation of Image Steganography Based on Cover Selection and Contourlet Transform. In: International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (CUBE) (2013) https://doi.org/10.1109/CUBE.2013.39
Sajedi, H., Jamzad, M.: Adaptive Steganography Method Based on Contourlet Transform In: \(9^th\) International Conference on Signal Processing (2008). https://doi.org/10.1109/ICOSP.2008.4697237
Hajduk, V., Broda, M., Kova, O., Levicky, D.: Image steganography with using QR code and cryptography. In: \(26^{th}\) conference on Radio elektronika (2016)
Sajedi, H., Jamzad, M.: Cover selection steganography method based on similarity of image blocks In: Proc. of IEEE \(8^{th}\) CIT Conference, Sydney, 379 - 384 (2008)
Sun, Y., Liu, F.: Selecting cover for image steganography by correlation coefficient. In: Proceedings of Second International Workshop on Education Technology and Computer Science, 2, 159 - 162 (2010)
Kharrazi, M., Sencar, H.T., Memon, N.: Cover selection for steganographic embedding. IEEE International Conference on Image Processing. 117–121, (2006)
Sajedi, H., Jamzad, M.: 2010 Using contourlet transform and cover selection for secure steganography. Int. J. Inf. Secur. 9, 337–352 (2010). https://doi.org/10.1007/s10207-010-0112-3
Wu, S., Liu, Y., Zhong, S., Liu, Y.: What Makes the Stego Image Undetectable? In: Proceedings of the \(7^{th}\) International Conference on Internet Multimedia Computing and Service Article No. 47 (2015)
Yuan, J., Chen, H.: Embedding Suitability Adaptive Cover Selection for Image Steganography. In: International Conference on e-Education, e-Business and Information Management. https://doi.org/10.2991/iceeim-14.2014.11 (2014)
Selesnick, I.W., Baraniuk, R.G., Kingsbury, Nick G.: The Dual Tree Complex Wavelet Transform. In: IEEE Signal Processing Magazine (2005)
Selesnick, I.W.: The Double Density DWT: In: Wavelets in Signal and Image Analysis: From Theory to Practice (2001)
Selesnick, I.W.: The double density dual tree DWT. IEEE Trans. Signal Process. 52(5), 1304–1314 (2004)
Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC 3(6), 610–621 (1973)
Galloway, M.M.: Texture Analysis Using Gray Level Run Lengths. Comput. Graph. Image Process. 4, 172–179 (1975)
Chu, A., Sehgal, C.M., Greenleaf, J.F.: Use of Gray Value Distribution of Run Lengths for Texture Analysis. Pattern Recognit. Lett. 11, 415–420 (1990)
USC-SIPI. (1997). http://sipi.usc.edu/database
Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines 2578, 340–354 (2003)
Sajedi, H., Jamzad, M.: CBS: Contourlet-based steganalysis method. J. Signal Process. Syst. 61, 367–373 (2010)
Schaefer, G., Stich, M.: UCID - an uncompressed colour image database Proceedings of Storage and Retrieval Methods and Applications for Multimedia. 5307, 472–480 (2004)
Nazari, S.: Cover Selection Steganography Via Run Length Matrix and Human Visual System. J. Inf. Syst. Telecommun. 1(2), 131–138 (2003)
Thabit, R., Khoo, B.E.: A new robust lossless data hiding scheme and its application to color medical images. Digit. Signal Proc. 38, 77–94 (2015)
Kanan, H.R., Nazeri, B.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14), 6123–6130 (2014)
Xiao, Moyan, He, Zhibiao: High capacity image steganography method based on framelet and compressive sensing. In: Proceedings of SPIE, Multispectral Image Acquisition, Processing, and Analysis, vol. 9811, p. 98110Y (2015)
Subhedar, M.S., Mankar, VH.: Image steganography using redundant discrete wavelet transform and QR factorization. In: Computers & Electrical Engineering (2016) https://doi.org/10.1016/j.compeleceng.2016.04.017
Sharma, V., Srivastava, D., Mathur, P.: A Daubechies DWT Based Image Steganography Using Smoothing Operation. Int. Arab. J. Inf. Technol. 17(2), (2020)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Subhedar, M.S. Cover selection technique for secure transform domain image steganography. Iran J Comput Sci 4, 241–252 (2021). https://doi.org/10.1007/s42044-020-00077-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42044-020-00077-9