Enhancing the Performance of the Data Embedment Process through Encoding Errors

Image steganography is a multipurpose-serving key emerging technology that is used for covertly transferring, storing, and governing various digital data, including intellectual properties and copyrights, social media data, multimedia data, and secrets of law-enforcing agencies. During the management in the stated information, nowadays, massive amounts of data are handled that require greater security. For that purpose, data are embedded into a cover image to hide them from any intruders. Nevertheless, the requirements of a larger embedding capacity, improved stego-image quality, and reduced time complexity is increasing. In this paper, the authors have presented a novel data-embedding scheme where the prediction error-based data-hiding scheme is modified in an intricate way so that all the image pixels can accept secret bits. A distance matrix between the pixel values of each image block and a reference value are measured first. Thereafter, the distances are encoded into two states: 1 and −1. That encoding process enables the scheme to implant one bit in every pixel of the cover image. During the bit implantation, the errors 1 and −1 are modified by shifting them to the right and left directions, respectively. This strategy enhances the embedding capacity by a factor of more than 2. The use of reference values reduces the computational complexity notably, and in the meanwhile increases the security and robustness of the scheme because the reference values are not open to any third party. The scheme also reduces the time complexity by 2–16 times with compared to its competing schemes. Experimental results prove the superiority of the proposed algorithm on embedding capacity, visual quality, and time complexity compared to the current well-accepted existing schemes.

[1]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[2]  Cheng-Hsing Yang,et al.  Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..

[3]  Theodore Tryfonas,et al.  JPEG steganography detection with Benford's Law , 2013, Digit. Investig..

[4]  Hong Zhao,et al.  Statistical analysis of several reversible data hiding algorithms , 2009, Multimedia Tools and Applications.

[5]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[6]  Mohammad Mahfuzul Islam,et al.  Enhancing the Robustness of Visual Degradation Based HAM Reversible Data Hiding , 2016, J. Comput. Sci..

[7]  Mohammad Mahfuzul Islam,et al.  Enhancing embedding capacity and stego image quality by employing multi predictors , 2017, J. Inf. Secur. Appl..

[8]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[9]  Wu-Lin Chen,et al.  High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding , 2015, Signal Process..

[10]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[11]  Mohammad Mahfuzul Islam,et al.  Boosting up the data hiding rate through multi cycle embedment process , 2016, J. Vis. Commun. Image Represent..

[12]  A H M Kamal Steganography: Securing Message in wireless network , 2013, BIOINFORMATICS 2013.

[13]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[14]  Chin-Feng Lee,et al.  A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..

[15]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Phalguni Gupta,et al.  Effect of morphing on embedding capacity and embedding efficiency , 2014, Neurocomputing.

[17]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[18]  Jin Liu,et al.  An M-Sequence Based Steganography Model for Voice over IP , 2009, 2009 IEEE International Conference on Communications.

[19]  Mohammad Mahfuzul Islam,et al.  Capacity improvement of reversible data hiding scheme through better prediction and double cycle embedding process , 2015, 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS).

[20]  Tung-Shou Chen,et al.  Data embedding using pixel value differencing and diamond encoding with multiple-base notational system , 2012, J. Syst. Softw..

[21]  Mohammad Mahfuzul Islam,et al.  Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram , 2016, 2016 International Conference on Networking Systems and Security (NSysS).

[22]  Amir-Hossein Jahangir,et al.  Benford's law behavior of Internet traffic , 2014, J. Netw. Comput. Appl..

[23]  Shiuh-Jeng Wang,et al.  VQ Applications in Steganographic Data Hiding Upon Multimedia Images , 2011, IEEE Systems Journal.

[24]  Ching-Chiuan Lin,et al.  An information hiding scheme with minimal image distortion , 2011, Comput. Stand. Interfaces.

[25]  S. Brindha,et al.  Hiding Fingerprint in Face using Scattered LSB Embedding Steganographic Technique for Smart card based Authentication System , 2011 .

[26]  Henk J. A. M. Heijmans,et al.  Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.

[27]  Zhe-Ming Lu,et al.  An improved lossless data hiding scheme based on image VQ-index residual value coding , 2009, J. Syst. Softw..

[28]  Kuo-Liang Chung,et al.  Distortion reduction for histogram modification-based reversible data hiding , 2012, Appl. Math. Comput..

[29]  Theodore Tryfonas,et al.  Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis , 2011, Int. J. Digit. Crime Forensics.

[30]  Anderson Rocha,et al.  Progressive randomization: Seeing the unseen , 2010, Comput. Vis. Image Underst..

[31]  Chien-Chang Chen,et al.  Adaptive reversible image watermarking scheme , 2011, J. Syst. Softw..

[32]  B. B. Amberker,et al.  DCT based reversible data embedding for MPEG-4 video using HVS characteristics , 2013, J. Inf. Secur. Appl..

[33]  Jiwu Huang,et al.  Steganalysis of JPEG steganography with complementary embedding strategy , 2011, IET Inf. Secur..

[34]  A H M Kamal,et al.  Facilitating and securing offline e-medicine service through image steganography. , 2014, Healthcare technology letters.

[35]  Tung-Shou Chen,et al.  A local variance-controlled reversible data hiding method using prediction and histogram-shifting , 2010, J. Syst. Softw..

[36]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .