FFT-ETM based distortion less and high payload image steganography

This paper is presenting a novel high capacity based imperceptible and robust image steganography technique for obscured communication. A considerable literature studied on this domain reveals distortion that drastically affects image quality. These techniques obscure covert data in most significant bits or least significant bits of host image via easy or unsystematic replacement. Such schemes are vulnerable to malevolent attacks like sample pair method, chi-square test, and quality of host image especially badly affected by MSB replacement. Furthermore, such schemes are lacking in carrying maximum covert information as the number of host image pixels and covert image pixels has the ratio 8:1. In our proposed scheme robust and imperceptibility feature is injected using insignificant pixel value divergence of host and a high capacity covert image. We have proposed frequency entropy method that compares frequencies of covert image and host image in FFT (Fast Fourier Transform) domain. The eminent rate of frequency ETM (Entropy Threshold Match) leads to good image quality and information carrying capability. Moreover, our proposed technique also encrypts the secret image in frequency domain with multi flipped permutated random key vector that provides robustness. Therefore, experiments exhibit that this scheme has improved signal to noise ratio and BPP (bits per pixel) in contrast to existing schemes.

[1]  Kazutake Uehira,et al.  A New Displaying Technology for Information Hiding Using Temporally Brightness Modulated Pattern , 2017 .

[2]  G. Charith K. Abhayaratne,et al.  Visual Attention-Based Image Watermarking , 2016, IEEE Access.

[3]  Fei Peng,et al.  A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting , 2018, IEEE Transactions on Information Forensics and Security.

[4]  Xiaoming Xi,et al.  Robust Image Fingerprinting Based on Feature Point Relationship Mining , 2018, IEEE Transactions on Information Forensics and Security.

[5]  Krishna Mohan Buddhiraju,et al.  Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking , 2015, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[6]  Ahmed Khan,et al.  Practical Guidelines for Securing Wireless Local Area Networks (WLANs) , 2018 .

[7]  Javaid A. Sheikh,et al.  Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption , 2018, IEEE Access.

[8]  H. P. Meana,et al.  Watermarking-based Color Image Authentication with Detection and Recovery Capability , 2016, IEEE Latin America Transactions.

[9]  Safya Belghith,et al.  A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.

[10]  Jau-Ji Shen,et al.  Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques , 2017, IEEE Transactions on Image Processing.

[11]  Hamid Reza Shahdoosti,et al.  Transform-based watermarking algorithm maintaining perceptual transparency , 2017, IET Image Process..

[12]  Anirban Bose,et al.  Spread Spectrum Watermark Detection on Degraded Compressed Sensing , 2017, IEEE Sensors Letters.

[13]  Xinpeng Zhang,et al.  Distortion function based on residual blocks for JPEG steganography , 2017, Multimedia Tools and Applications.

[14]  Karim Faez,et al.  An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.

[15]  Zongmin Cui,et al.  Blind Reversible Authentication Based on PEE and CS Reconstruction , 2018, IEEE Signal Processing Letters.

[16]  Zahid Mehmood,et al.  Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption , 2019, Soft Comput..

[17]  Damon M. Chandler,et al.  Digital Image Watermarking via Adaptive Logo Texturization , 2015, IEEE Transactions on Image Processing.

[18]  Chia-Chen Lin,et al.  Blind Dual Watermarking for Color Images’ Authentication and Copyright Protection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Yun-Qing Shi,et al.  Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Mohsen A. M. El-Bendary,et al.  FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks , 2017, Multimedia Tools and Applications.

[21]  Gheith A. Abandah,et al.  Crypto-based algorithms for secured medical image transmission , 2015, IET Inf. Secur..

[22]  Houbing Song,et al.  Digital image watermarking method based on DCT and fractal encoding , 2017, IET Image Process..

[23]  Asifullah Khan,et al.  High capacity reversible image watermarking using error expansion and context-dependent embedding , 2015 .

[24]  Xiaochun Cao,et al.  Fake Colorized Image Detection , 2018, IEEE Transactions on Information Forensics and Security.

[25]  WADOOD ABDUL,et al.  Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.

[26]  Weiming Zhang,et al.  Which gray level should be given the smallest cost for adaptive steganography? , 2017, Multimedia Tools and Applications.

[27]  D. N. Vizireanu,et al.  Watermarking-based image authentication robust to JPEG compression , 2015 .

[28]  Ahmed Khan,et al.  Feature Selection Based Correlation Attack on HTTPS Secure Searching , 2018, Wirel. Pers. Commun..

[29]  Jordi Cabot,et al.  On Watermarking for Collaborative Model-Driven Engineering , 2018, IEEE Access.

[30]  Anand Singh Jalal,et al.  LSB based non blind predictive edge adaptive image steganography , 2017, Multimedia Tools and Applications.

[31]  Textual Steganography,et al.  HIGH-CAPACITY MULTI-LAYER FRAMEWORK FOR HIGHLY ROBUST , 2016 .

[32]  Jing Liu,et al.  3D model watermarking algorithm robust to geometric attacks , 2017, IET Image Process..

[33]  P. Vijay Bhaskar Reddy,et al.  Privacy-preserving Image Processing in the Cloud , 2019 .

[34]  Guopu Zhu,et al.  Transportation Spherical Watermarking , 2018, IEEE Transactions on Image Processing.

[35]  Ahmed Khan,et al.  Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method , 2019, Soft Comput..

[36]  Ahmed Khan,et al.  High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device , 2019, Wirel. Pers. Commun..

[37]  Isha Mehra,et al.  Gyrator wavelet transform , 2018, IET Image Process..

[38]  Héctor M. Pérez Meana,et al.  Improved imperceptible visible watermarking algorithm for auxiliary information delivery , 2018, IET Biom..

[39]  Zhaofeng Ma,et al.  Digital rights management: Model, technology and application , 2017, China Communications.

[40]  Na Zhang,et al.  Digital watermarking algorithm based on scale-invariant feature regions in non-subsampled contourlet transform domain , 2015 .

[41]  Ahmed Khan Robust Textual Steganography , 2015 .

[42]  Aliazam Abbasfar,et al.  A Watermarking Method for Digital Speech Self-Recovery , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[43]  Kazutake Uehira,et al.  Display technique for embedding information in real object images using temporally and spatially luminance-modulated light , 2016, 2016 IEEE Industry Applications Society Annual Meeting.

[44]  Ahmed Khan Joint Ownership Verification for Digital Text , 2015, CSA 2015.

[45]  Karen A. Scarfone,et al.  Vetting the Security of Mobile Applications , 2015 .

[46]  Song Guo,et al.  Robust Histogram Shape-Based Method for Image Watermarking , 2015, IEEE Transactions on Circuits and Systems for Video Technology.