A Robust Image Steganography Method Using PMM in Bit Plane Domain
Authors: Souvik Bhattacharyya, Aparajita Khan, Indradip Banerjee, Gautam Sanyal
Abstract:
Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Keywords: PMM (Pixel Mapping Method), Bit Plane, Steganography, SSIM, KL-Divergence.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337857
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2865References:
[1] G. J. Simmons., The prisoners’ problem and the subliminal channel, Proceedings of CRYPTO. 83 (1984) 51–67.
[2] R. Anderson., Stretching the limits of steganography, Information Hiding, Springer Lecture Notes in Computer Science 1174 (1996) 39–48.
[3] R. J. Anderson., F. A.P.Petitcolas., On the limits of steganography, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issueon Copyright and Privacy Protection 16 (1998) 474–481.
[4] S. Craver., On public-key steganography in the presence of an active warden, in: Proceedings of 2nd International Workshop on Information Hiding., Portland, Oregon, USA, 1998, pp. 355–368.
[5] N.F.Johnson., S. Jajodia., Steganography: seeing the unseen, IEEE Computer 16 (1998) 26–34.
[6] J. E. T Mrkel., M. Olivier., An overview of image steganography, in: Proceedings of the fifth annual Information Security South AfricaConference., 2005.
[7] S. Bhattacharyya., G. Sanyal., Study of secure steganography model, in: Proceedings of International Conference on Advanced Computing and Communication Technologies (ICACCT-2008), Panipath, India, 2008.
[8] S. Bhattacharyya., G. Sanyal., An image based steganography model for promoting global cyber security, in: Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad, India, 2009.
[9] S. Bhattacharyya., G. Sanyal., Implementation and design of an image based steganographic model, in: Proceedings of IEEE InternationalAdvance Computing Conference, Patiala,India, 2009.
[10] S. B. A. K. et al., G. Sanyal., Pixel mapping method (PMM) based bit plane complexity segmentation (bpcs) steganography, in: Proceedings of WICT 2011, Mumbai, India, 2011.
[11] Y. K. Lee., L. H.Chen., High capacity image steganographic model, IEEE Proc.-Vision, Image and Signal Processing 147 (2000) 288–294.
[12] C. Chan., L. M.Cheng, Hiding data in images by simple lsb substitution, Pattern Recognition 37 (2004) 469–474.
[13] D. Wu., W. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003) 1613–1626.
[14] P. H. K.C. Chang., C.P Chang., T. Tu., A novel image steganography method using tri-way pixel value differencing, Journal of Multimedia 3.
[15] C.-S. T. C.-M. Wang, N.-I. Wu, M.-S. Hwang., A high quality stegano-graphic method with pixel-value differencing and modulus function, The Journal of Systems and Software 81(1) (2008) 150–158.
[16] P. V. C. E., Gray level modification steganography for secret communication, in: IEEE International Conference on Industrial Informatics.,Berlin, Germany, 2004, pp. 355–368.
[17] X. Zhang, and S. Wang, Efficient steganographic embedding by exploiting modification direction, Journal of IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
[18] Ruey-Ming Chao, Hsien-Chu Wu, Chih-Chiang Lee, and Yen-Ping Chu A Novel Image Data Hiding Scheme with Diamond Encoding EURASIP Journal on Information Security Volume 2009, Article ID 658047, 9 pages
[19] X. Zhang, S. Wang. C. C. L. R.M. Chao, H. C. Wu, Y. P. Chu.T. H. Chang, C.C., A steganographic method for digital images using side match., Pattern Recognition Letter 25 (2004) 1431–1437
[20] S. Bhattacharyya., G. Sanyal., Hiding data in images using pixel mapping method (PMM), in: Proceedings of 9th annual Conference onSecurity and Management (SAM) under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (WorldComp 2010), LasVegas, USA, July 12-15,2010.
[21] L. K. Souvik Bhattacharyya, G. Sanyal., A novel approach of data hiding using pixel mapping method (PMM), International Journal Ofcomputer Science and Information Security(IJCSIS) 8.
[22] P. B. T. Pevn, J. Fridrich., Steganalysis by subtractive pixel adjacency matrix., IEEE Transactions on Information Forensics and Security,5(2):215-224.
[23] C. W. N. Y. Tao Han, Weiming Zhang, Y. Zhu., Adaptive steganography in extended noisy region.
[24] R. O. E. E. Kawaguchi, Principle and applications of bpcs-steganography, in: Proc. SPIE 3528, Multimedia Systems and Applications, 464. Conference Volume 3528, November 01, 1998.15
[25] H. N. M. Niimi, E. Kawguchi., A steganography based on region segmentation by using complexity measure., Trans. of IEICE, J81-D-II, pp.1132-1140,1998.
[26] A. Habes, 4 least significant bits information hiding implementation andanalysis, in: Proc. GVIP 05 Conference, CICC,Cairo, Egypt,2005.
[27] B. P. Pevn, T., J. Fridrich, Review: Steganography bit plane complexity segmentation (bpcs) technique, International Journal of Engineering Science and Technology,Vol. 2(9), 2010, 4860-4868.
[28] Ucid image database
[online].URL http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html
[29] I. A. C. B. F. I. H. R. S. S. M. I. Zhou Wang, Member, I. EeroP. Simoncelli, Senior Member, Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Imageprocessing. 3
[30] C.Cachin., An information theoretic model for steganography., Proceed-ings of 2nd Workshop on Information Hiding. D. Aucsmith (Eds.).Lecture Notes in Computer Sciences, Springer-verlag. 1525.
[31] A. Westfeld, A. Pfitzmann., Attacks on steganographic systems., In Proceedings of the Third Intl. Workshop on Information Hiding, Springer-verlag. (1999) 61–76.
[32] Guillermito., Steganography: A few tools to discover hidden data.
[33] G. M. D. R. Fridrich, J., Detecting lsb steganography in color, and gray-scale images, IEEE Multimedia 8. (2001) 22–28.
[34] W. X. W. Z. Dumitrescu, S., Detection of lsb steganography via sample pair analysis, in: Proceedings of 5th Information Hiding Workshop, Vol.2578, 2002, pp. 355–372.
[35] A. Ker, Improved detection of lsb steganography in grayscale images in: Proc.6th Information Hiding Workshop. Volume 3200 of Springer LNCS, 2004, pp. 97–115.
[36] A. D. Ker, Optimally weighted least-squares steganalysis, in: Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 650506 (February 27, 2007).
[37] Fridrich, J. Kodovsk., Rich models for steganalysis of digital images., IEEE Transactions on Information Forensics and Security. 7(3) 868–882.
[38] S. K. et. al., Steganalysis by subtractive pixel adjacency matrix, IEEE Trans. Inf. Forensics and Sec., 5, 215-224, 2010.
[39] J. F. J. Kodovsk, V. Holub., Ensemble classifiers for steganalysis of digital media., IEEE Transactions on Information Forensics and Security.