A high-capacity and secure least significant bit embedding approach based on word and letter frequencies

In this paper, we propose a novel least significant bit embedding approach that capitalizes on the skewed distribution of letter and word frequencies to achieve higher image capacity, quality, and security. We initially conduct a study that involves all of the character frequencies using a data set of 14.245 billion characters. Huffman coding for each character is generated on the basis of its probability of occurrence. Furthermore, the top 100 000 most frequent words are transformed into a smaller ciphertext that has a lower cost. Our work demonstrates that recognizing characters and words on the basis of their frequency patterns and prioritizing them accordingly has a greater prospect of reducing the overall cost of embedding. The proposed scheme significantly outperforms Lempel–Ziv–Welch compression with an average of 45% fewer embedded bits. Moreover, the image quality is improved by a mean peak signal-to-noise ratio value of 6.9%. The proposed method also establishes a security embedding by proposing a novel shuffling algorithm. Copyright © 2017 John Wiley & Sons, Ltd.

[1]  E. Thorp Nonrandom Shuffling with Applications to the Game of Faro , 1973 .

[2]  Gonzalo Navarro,et al.  Approximate string matching on Ziv-Lempel compressed text , 2003, J. Discrete Algorithms.

[3]  Nadeem Akhtar,et al.  Enhancing the Security and Quality of LSB Based Image Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[4]  Guangming Tang,et al.  Optimized LSB Matching Steganography Based on Fisher Information , 2012, J. Multim..

[5]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[6]  Wojciech Mazurczyk,et al.  Trends in steganography , 2014, Commun. ACM.

[7]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[8]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[9]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[10]  P. Diaconis,et al.  SHUFFLING CARDS AND STOPPING-TIMES , 1986 .

[11]  Irving E. Fang It Isn't Etaoin Shrdlu; It's Etaoni Rshdlc , 1966 .

[12]  D. Huffman A Method for the Construction of Minimum-Redundancy Codes , 1952 .

[13]  Kousik Dasgupta,et al.  A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain , 2014 .

[14]  Mark Davies Examining syntactic variation in English: The importance of corpus design and corpus size , 2013 .

[15]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .