Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate

ABSTRACT In modern electronic communication, ensuring security during transferring of data is crucial. Digital steganography is the technique that ensures the same, in which any secret data is hidden into the cover mediums such as images, audio or video files. Resistance to removal and invisibility of hidden data are the two important requirements of any steganographic system. This paper proposes a new approach to hide any secret data in images. Also, this paper proposes a new approach which hides an executable file in images. The executable files we have considered are Windows PE (Portable-Executable) files. Moreover from the experimental results, it is proven that the proposed approach is suitable for hiding all type of digital files including exe files. Also, comparing with the existing approaches, this approach shows better performance.

[1]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[2]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[3]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[4]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[6]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[7]  Bin Li,et al.  Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[9]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[10]  T. Rabie High-capacity steganography , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[11]  John Langford,et al.  Provably Secure Steganography , 2002, IEEE Transactions on Computers.

[12]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[13]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[14]  Liang Zhang,et al.  A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.

[15]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[16]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[17]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[18]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[19]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[20]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[21]  Kathryn Hempstalk,et al.  Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .