Hiding in encrypted images: a three tier security data hiding technique

This paper presents a new crypto domain data hiding technique based on Intermediate Significant Bit Plane Embedding (ISBPE). The cover image is encrypted; the information to be secured is scrambled, and then embedded in the Intermediate Significant Bit (ISB) planes of encrypted cover image, at the locations determined by a Pseudorandom Address Vector (PAV). The pseudorandom embedding of the scrambled data in the ISB planes of encrypted image results in a three tier security of the data to be secured. The ISBPE embedding results in an important advantage that the proposed scheme becomes completely robust to commonly employed attack of Least Significant Bit (LSB) removal/replacement. A novel concept of embedding a very small size fragile watermark in addition to the secret information has been used which facilitates early tamper detection. This feature could save crucial processor time in critical situations of national security issues/warfare etc. Experimental results show that the proposed scheme is more robust to various signal processing attacks like Joint Picture Expert Group compression, Additive White Gaussian Noise and ‘salt and pepper’ noise as compared to conventional LSB based embedding techniques. Comparison results with some well-known techniques show that besides providing high degree of security and robustness to various malicious attacks the proposed technique is capable of embedding a fairly large amount of secret data in the host image while maintaining a good stego-image quality.

[1]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[2]  Xiaolong Li,et al.  A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding , 2014, Signal Process..

[3]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[4]  Hyoung Joong Kim,et al.  Near-optimal solution to pair-wise LSB matching via an immune programming strategy , 2010, Inf. Sci..

[5]  Abid Yahya,et al.  Secured and robust information hiding scheme , 2013 .

[6]  Javaid Ahmad,et al.  Field programmable gate array (FPGA) implementation of novel complex PN-code-generator- based data scrambler and descrambler , 2010 .

[7]  Reza Azarderakhsh,et al.  Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[8]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[9]  Amitesh Singh Rajput,et al.  Towards the growth of image encryption and authentication schemes , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[10]  Jeho Nam,et al.  A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[11]  Shabir A. Parah,et al.  A secure and robust information hiding technique for covert communication , 2015 .

[12]  KokSheik Wong,et al.  Universal data embedding in encrypted domain , 2014, Signal Process..

[13]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[14]  Wu-Lin Chen,et al.  High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding , 2015, Signal Process..

[15]  Zhenxing Qian,et al.  Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..

[16]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[17]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[18]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[19]  Javaid A. Sheikh,et al.  Data hiding in intermediate significant bit planes, a high capacity blind steganographic technique , 2012, 2012 International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET).

[20]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[21]  Julio César Hernández Castro,et al.  A framework for avoiding steganography usage over HTTP , 2012, J. Netw. Comput. Appl..

[22]  Azizah Abdul Manaf,et al.  High watermarking capacity based on spatial domain technique , 2011 .

[23]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[24]  Ercan Solak Passion of chaotic cryptography , 2013, 2013 21st Signal Processing and Communications Applications Conference (SIU).