High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform

Abstract The importance of image steganography is unquestionable in the field of secure multimedia communication. Imperceptibility and high payload capacity are some of the crucial parts of any mode of steganography. The proposed work is an attempt to modify the edge-based image steganography which provides higher payload capacity and imperceptibility by making use of machine learning techniques. The approach uses an adaptive embedding process over Dual-Tree Complex Wavelet Transform (DT-CWT) subband coefficients. Machine learning based optimization techniques are employed here to embed the secret data over optimal cover-image-blocks with minimal retrieval error. The embedding process will create a unique secret key which is imperative for the retrieval of data and need to be transmitted to the receiver side via a secure channel. This enhances the security concerns and avoids data hacking by intruders. The algorithm performance is evaluated with standard benchmark parameters like PSNR, SSIM, CF, Retrieval error, BPP and Histogram. The results of the proposed method show the stego-image with PSNR above 50 dB even with a dense embedding of up to 7.87 BPP. This clearly indicates that the proposed work surpasses the state-of-the-art image steganographic systems significantly.

[1]  Sushil Kumar,et al.  Image Steganogaraphy Based on Complex Double Dual Tree Wavelet Transform , 2013 .

[2]  Randa Atta,et al.  A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set , 2018, J. Vis. Commun. Image Represent..

[3]  De-Shuang Huang,et al.  A Constructive Hybrid Structure Optimization Methodology for Radial Basis Probabilistic Neural Networks , 2008, IEEE Transactions on Neural Networks.

[4]  Sahib Khan,et al.  Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region , 2018 .

[5]  Yazan Aljeroudi,et al.  Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.

[6]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[7]  Peter James Vial,et al.  Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research , 2019, Neurocomputing.

[8]  Malin Premaratne,et al.  Image similarity index based on moment invariants of approximation level of discrete wavelet transform , 2012 .

[9]  H. Dadgostar,et al.  Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB , 2016, J. Inf. Secur. Appl..

[10]  Richard Baraniuk,et al.  The Dual-tree Complex Wavelet Transform , 2007 .

[11]  Qingzhong Liu,et al.  Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images , 2014, ACM Trans. Intell. Syst. Technol..

[12]  J. K. Mandal,et al.  High payload image steganography based on Laplacian of Gaussian (LoG) edge detector , 2018, Multimedia Tools and Applications.

[13]  Ahmed Al-Ani,et al.  A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..

[14]  Vijay H. Mankar,et al.  Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.

[15]  S. Selvakumar,et al.  High payload image steganography with reduced distortion using octonary pixel pairing scheme , 2013, Multimedia Tools and Applications.

[16]  Chin-Chen Chang,et al.  An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes , 2018, Displays.

[17]  Syed Rameez Naqvi,et al.  Reversible integer wavelet transform for blind image hiding method , 2017, PloS one.

[18]  Parthasarathy Guturu,et al.  A class of new KNN methods for low sample problems , 1990, IEEE Trans. Syst. Man Cybern..

[19]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[20]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Driss Aboutajdine,et al.  A robust digital image watermarking method using Dual Tree Complex Wavelet Transform , 2008, 2008 IEEE Symposium on Computers and Communications.

[22]  De-Shuang Huang,et al.  Human face recognition based on multi-features using neural networks committee , 2004, Pattern Recognit. Lett..

[23]  Vijay Kumar,et al.  A modified DWT-based image steganography technique , 2017, Multimedia Tools and Applications.

[24]  Xiaofeng Wang,et al.  A Novel Density-Based Clustering Framework by Using Level Set Method , 2009, IEEE Transactions on Knowledge and Data Engineering.

[25]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[26]  Xiaofeng Wang,et al.  An efficient local Chan-Vese model for image segmentation , 2010, Pattern Recognit..

[27]  E Baburaj,et al.  Sobel edge detection technique implementation for image steganography analysis , 2018 .

[28]  Yu Wang,et al.  The LSB-based High Payload Information Steganography , 2015, ICM 2015.

[29]  De-Shuang Huang,et al.  Improved extreme learning machine for function approximation by encoding a priori information , 2006, Neurocomputing.

[30]  Phalguni Gupta,et al.  Edge-based image steganography , 2014, EURASIP J. Inf. Secur..

[31]  Tanveer J. Siddiqui,et al.  Robust image steganography using complex wavelet transform , 2013, IMPACT-2013.