An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method

We improve the quality and provide an acceptable payload using NVF.NVF estimates each area's complexity to embed more data in complex areas.The secret image security is ensured by an optimal chaotic based encryption scheme.An optimal secret key is found by a hybrid GA/PSO algorithm to increase the quality.The proposed scheme can resist against the well-known RS-steganalysis. Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.

[1]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[2]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[3]  M. Hwang,et al.  (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .

[4]  Karim Faez,et al.  Image Hiding by Using Genetic Algorithm and LSB Substitution , 2010, ICISP.

[5]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[6]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[7]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[8]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[9]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[10]  Punam Bedi,et al.  Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..

[11]  Tao Zhang,et al.  Detection of LSB matching steganography based on distribution of pixel differences in natural images , 2010, 2010 International Conference on Image Analysis and Signal Processing.

[12]  Iuon-Chang Lin,et al.  Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.

[13]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[14]  Anindya Sarkar,et al.  Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.

[15]  Shiuh-Jeng Wang,et al.  Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..

[16]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[17]  Pradeep M. Patil,et al.  Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..

[18]  Nameer N. El-Emam,et al.  New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..

[20]  S. Mazloom,et al.  Color image encryption based on Coupled Nonlinear Chaotic Map , 2009 .

[21]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[22]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[23]  D. E. Goldberg,et al.  Genetic Algorithms in Search , 1989 .

[24]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[25]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[26]  C.-C. Jay Kuo,et al.  Steganography in JPEG2000 compressed images , 2003, IEEE Trans. Consumer Electron..

[27]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[28]  Punam Bedi,et al.  Using PSO in Image Hiding Scheme Based on LSB Substitution , 2011, ACC.

[29]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[30]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[31]  Der-Chyuan Lou,et al.  A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..

[32]  Taejeong Kim,et al.  Side match and overlap match vector quantizers for images , 1992, IEEE Trans. Image Process..

[33]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[34]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[35]  George Stephanides,et al.  A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..

[36]  Hideki Noda,et al.  BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..

[37]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[38]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[39]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[40]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[41]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[42]  Chin-Chen Chang,et al.  A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..

[43]  Liang Zhang,et al.  A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.

[44]  Punam Bedi,et al.  Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization , 2010, SEMCCO.

[45]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[46]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[47]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[48]  Chin-Chen Chang,et al.  A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy , 2009, J. Syst. Softw..

[49]  Cheng-Hsing Yang,et al.  Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..

[50]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[51]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[52]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[53]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[54]  Nameer N. El-Emam Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .

[55]  Mohamed A. Bamatraf,et al.  Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation , 2011, Int. Arab. J. e Technol..

[56]  Tung-Shou Chen,et al.  Data embedding using pixel value differencing and diamond encoding with multiple-base notational system , 2012, J. Syst. Softw..