Eigenfaces-Based Steganography

In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details). The study found that when the method was trained on large enough data sets, image quality was nearly unaffected by modification of some linear combination coefficients used as PCA-based features. The proposed method is only limited to facial images, but in the era of overwhelming influence of social media, hundreds of thousands of selfies uploaded every day to social networks do not arouse any suspicion as a potential steganography communication channel. From our best knowledge there is no description of any popular steganography method that utilizes eigenfaces image domain. Due to this fact we have performed extensive evaluation of our method using at least 200,000 facial images for training and robustness evaluation of proposed approach. The obtained results are very promising. What is more, our numerical comparison with other state-of-the-art algorithms proved that eigenfaces-based steganography is among most robust methods against compression attack. The proposed research can be reproduced because we use publicly accessible data set and our implementation can be downloaded.

[1]  S. K. Srivatsa,et al.  Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA , 2012 .

[2]  Tarun Mirani,et al.  Face Detection and Steganography Algorithms for Passport Issuing System , 2014 .

[3]  Craig Valli,et al.  Integration of Biometrics and Steganography: A Comprehensive Review , 2019, Technologies.

[4]  Muzafer Saračević,et al.  A Novel Approach to Data Encryption Based on Matrix Computations , 2021 .

[5]  N. Hamid,et al.  Image Steganography Techniques : An Overview , 2012 .

[6]  Zhilin Li,et al.  Effects of JPEG compression on image classification , 2003 .

[7]  Clifford Bergman,et al.  Unitary embedding for data hiding with the SVD , 2005, IS&T/SPIE Electronic Imaging.

[8]  Chin-Chen Chang,et al.  AN SVD ORIENTED WATERMARK EMBEDDING SCHEME WITH HIGH QUALITIES FOR THE RESTORED IMAGES , 2007 .

[9]  Rejani Comparative Study of Spatial Domain Image Steganography Techniques , 2015 .

[10]  Madhuri S. Joshi,et al.  A High Capacity Secured Image Steganography Method with Five Pixel Pair Differencing and LSB Substitution , 2015 .

[11]  K. M. Singh,et al.  A Robust Steganographic Method based on Singular Value Decomposition , 2006 .

[12]  Seifedine Kadry,et al.  New Generating Technique for Image Steganography , 2013 .

[13]  Prithwish Das,et al.  A New Image Steganography Method using Message Bits Shuffling , 2018, JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES.

[14]  T. Sørensen,et al.  A method of establishing group of equal amplitude in plant sociobiology based on similarity of species content and its application to analyses of the vegetation on Danish commons , 1948 .

[15]  Vladimir I. Levenshtein,et al.  Binary codes capable of correcting deletions, insertions, and reversals , 1965 .

[16]  Stefanos Zafeiriou,et al.  300 Faces In-The-Wild Challenge: database and results , 2016, Image Vis. Comput..

[17]  Xiaogang Wang,et al.  Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).

[18]  Mehmet Demirci,et al.  StegoGIS: A new steganography method using the geospatial domain , 2019 .

[19]  Muzafer Saračević,et al.  A novel approach to steganography based on the properties of Catalan numbers and Dyck words , 2019, Future Gener. Comput. Syst..

[20]  Kuo-Liang Chung,et al.  On SVD-based watermarking algorithm , 2007, Appl. Math. Comput..

[21]  Nicholas Ayache,et al.  Geometric Means in a Novel Vector Space Structure on Symmetric Positive-Definite Matrices , 2007, SIAM J. Matrix Anal. Appl..

[22]  Debajyoti Mukhopadhyay,et al.  Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach , 2011, ArXiv.

[23]  Marghny H. Mohamed,et al.  High Capacity Image Steganography Technique based on LSB Substitution Method , 2016 .

[24]  Emil Simion,et al.  Steganography techniques , 2017, IACR Cryptol. ePrint Arch..

[25]  L Sirovich,et al.  Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[26]  A. W. Wahab,et al.  High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution , 2018, Applied Sciences.

[27]  Marek R. Ogiela,et al.  Multiply information coding and hiding using fuzzy vault , 2019, Soft Comput..

[28]  Wojciech Mazurczyk,et al.  PadSteg: introducing inter-protocol steganography , 2013, Telecommun. Syst..

[29]  George Ghinea,et al.  Stego image quality and the reliability of PSNR , 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications.

[30]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[31]  J. S. Chitode,et al.  Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA , 2016 .

[32]  Josephine Sullivan,et al.  One millisecond face alignment with an ensemble of regression trees , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[33]  M. Pantic,et al.  Faces InThe-Wild Challenge : Database and Results , 2016 .

[34]  Awad H. Al-Mohy,et al.  Improved Inverse Scaling and Squaring Algorithms for the Matrix Logarithm , 2012, SIAM J. Sci. Comput..

[35]  Wisam Elmasry,et al.  New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check , 2018 .

[36]  Shiguang Shan,et al.  Learning Euclidean-to-Riemannian Metric for Point-to-Set Classification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.