Enhancing LSB embedding schemes using chaotic maps systems

In our modern life, persons and institutions alike are rapidly embracing the shift toward communication via the Internet. As these entities adopt a faster and efficient communication protocol, information security techniques such as steganography and cryptography become powerful and necessary tools for conducting secure and secrecy communications. Currently, several steganography techniques have been developed, and the least significant bit (LSB) is one of these techniques which is a popular type of steganographic algorithms in the spatial domain. Indeed, as any other existing techniques, the selection of positions for data embedding within a cover signal mainly depends on a pseudorandom number generator without considering the relationship between the LSBs of the cover signal and the embedded data. In this paper and for best pixels’ positions adjustment, in which the visual distortion of the stego-image, as well as the embedding changes, becomes optimum, we propose two new position selection scenarios of LSBs-based steganography. Our new works are to improve the embedding efficiency, that is to say, select the suitable cover image pixels’ values that optimize the expected number of modifications per pixel and the visual distortion.

[1]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[2]  David L. Neuhoff,et al.  Structural Texture Similarity Metrics for Image Analysis and Retrieval , 2013, IEEE Transactions on Image Processing.

[3]  Andrew D. Ker A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.

[4]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[5]  Odai M.Al-Shatanawi,et al.  A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection , 2015 .

[6]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[7]  Zhen Liu,et al.  Image Information Hiding Encryption Using Chaotic Sequence , 2007, KES.

[8]  Srikanta Patnaik,et al.  Can a chaos system provide secure communication over insecure networks?—Online automatic teller machine services as a case study , 2018, J. Electronic Imaging.

[9]  Shifei Ding,et al.  Research on Point-wise Gated Deep Networks , 2017, Appl. Soft Comput..

[10]  Gandharba Swain,et al.  Digital Image Steganography based on Seven Way Pixel Value Differencing , 2016 .

[11]  Nan Zhang,et al.  Unsupervised and semi-supervised extreme learning machine with wavelet kernel for high dimensional data , 2016, Memetic Computing.

[12]  Mohan S. Kankanhalli,et al.  Currency security and forensics: a survey , 2015, Multimedia Tools and Applications.

[13]  Rinaldi Munir,et al.  Secure Spread Spectrum Watermarking Algorithm Based on Chaotic Map for Still Images , 2007 .

[14]  C. Vasantha Lakshmi,et al.  Robust Adaptive Watermarking Based on Image Contents Using Wavelet Technique , 2015 .

[15]  Jing Dong,et al.  SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.

[16]  Azizah Abdul Manaf,et al.  Collusion-Resistant digital video watermarking for copyright protection application , 2016 .

[17]  Partha Pratim Ray Towards an Internet of Things based architectural framework for defence , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[18]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[19]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[20]  Zhengjun Zhai,et al.  A New Image Encryption Algorithm Based on Multiple Chaos System , 2008, ISECS 2008.

[21]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[22]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[23]  Chin-Chen Chang,et al.  New image steganographic methods using run-length approach , 2006, Inf. Sci..

[24]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[25]  Chien-Ping Chang,et al.  High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..

[26]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[27]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[28]  Shifei Ding,et al.  An overview on Restricted Boltzmann Machines , 2018, Neurocomputing.

[29]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[30]  Muhammad N. Marsono,et al.  Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..

[31]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[32]  Petr Dzurenda,et al.  On Feasibility of Post-Quantum Cryptography on Small Devices , 2018 .

[33]  Wen Gao,et al.  A variable depth LSB data hiding technique in images , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[34]  Denis Volkhonskiy,et al.  Generative Adversarial Networks for Image Steganography , 2017 .

[35]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[36]  Konstantinos N. Plataniotis,et al.  Towards a Full-Reference Quality Assessment for Color Images Using Directional Statistics , 2015, IEEE Transactions on Image Processing.

[37]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[38]  Rainer Böhme,et al.  The security cost of cheap user interaction , 2011, NSPW '11.

[39]  Kwok-Wo Wong,et al.  An efficient chaotic image encryption algorithm based on a generalized Arnold map , 2012, Nonlinear Dynamics.