LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map

In this paper, we propose a LSB steganography algorithm to hide pseudorandomly sensitive information in digital images. This algorithm affects the statistic features of the sensitive information before it is embedded in the cover image. Also, it satisfies the imperceptibility condition of the hidden information, required in steganography systems, by using a pseudorandom LSB technique endorsed on three chaotic noise generators based on the skew tent chaotic map. Additionally, the embedding capacity of the proposed algorithm can be up to 37% of the cover image size, satisfying the imperceptibility condition, when one bit of sensitive information is embedded per each embedding pixel. We evaluated the proposed algorithm using two criteria: cover image affectation and robustness against steganalysis attacks. To evaluate the cover image affectation, we considered metrics of texture, quality and perceptual quality. To evaluate the robustness against attacks, we use the StegExpose tool, which analyzes the images obtained from the proposed algorithm, and it includes the main methods of steganalysis such as Sample Pairs , RS Analysis , Chi-Square Attack and Primary Sets Analysis . Finally, we show that the proposed algorithm has similar performance, and even better, to three commonly used steganography tools.

[1]  Melad J. Saeed,et al.  A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE , 2013 .

[2]  Gholamreza Akbarizadeh,et al.  A New Statistical-Based Kurtosis Wavelet Energy Feature for Texture Recognition of SAR Images , 2012, IEEE Transactions on Geoscience and Remote Sensing.

[3]  Awais Ahmad,et al.  An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment , 2018, Soft Comput..

[4]  Jakub Safarik,et al.  JPEG steganography with particle swarm optimization accelerated by AVX , 2020, Concurr. Comput. Pract. Exp..

[5]  Souvik Roy,et al.  Online payment system using steganography and visual cryptography , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[6]  Gholamreza Akbarizadeh,et al.  Integration of Spectral Histogram and Level Set for Coastline Detection in SAR Images , 2019, IEEE Transactions on Aerospace and Electronic Systems.

[7]  Kamrul Hasan Talukder,et al.  An Improved Approach in Audio Steganography Using Genetic Algorithm with K-Bit Symmetric Security Key , 2018, 2018 21st International Conference of Computer and Information Technology (ICCIT).

[8]  Fan Wang,et al.  Deep Convolutional Neural Network Used in Single Sample per Person Face Recognition , 2018, Comput. Intell. Neurosci..

[9]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[10]  Harpreet Kaur,et al.  A Survey on different techniques of steganography , 2016 .

[11]  Song Huang,et al.  Digital Watermarking Based on Neural Network and Image Features , 2009, 2009 Second International Conference on Information and Computing Science.

[12]  Wei Sun,et al.  High payload image steganography with minimum distortion based on absolute moment block truncation coding , 2015, Multimedia Tools and Applications.

[13]  Hongyu Li,et al.  VSI: A Visual Saliency-Induced Index for Perceptual Image Quality Assessment , 2014, IEEE Transactions on Image Processing.

[14]  Karla K. Evans,et al.  Intention, attention and long-term memory for visual scenes: It all depends on the scenes , 2018, Cognition.

[15]  Kamaldeep Joshi,et al.  New approach toward data hiding using XOR for image steganography , 2016, 2016 Ninth International Conference on Contemporary Computing (IC3).

[16]  Robert Jarusek,et al.  Robust steganographic method based on unconventional approach of neural networks , 2018, Appl. Soft Comput..

[17]  Sakshi Pratap,et al.  Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection , 2014, SocProS.

[18]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[19]  Hui Tian,et al.  Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs , 2017, Signal Process..

[20]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[21]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[22]  Christian Cachin,et al.  An information-theoretic model for steganography , 2004, Inf. Comput..

[23]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[24]  Asma Raeisi,et al.  Combined Method of an Efficient Cuckoo Search Algorithm and Nonnegative Matrix Factorization of Different Zernike Moment Features for Discrimination Between Oil Spills and Lookalikes in SAR Images , 2018, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[25]  Peter Kovesi,et al.  Image Features from Phase Congruency , 1995 .

[26]  Mohamed Nadif,et al.  Simultaneous Spectral Data Embedding and Clustering , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[27]  Mohammad Shorif Uddin,et al.  Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study , 2019, Journal of Computer and Communications.

[28]  Shanyu Tang,et al.  An efficient and secure VoIP communication system with chaotic mapping and message digest , 2017, Multimedia Systems.

[29]  Mikhail Belkin,et al.  Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.

[30]  Dany Thomas Koshy,et al.  Steganography on thermal images using generation technique , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[31]  Ajay Jadhav,et al.  Steganography An Art of Hiding Data , 2009, ArXiv.

[32]  Manas Kumar Haldar,et al.  Online Voting System based on Image Steganography and Visual Cryptography , 2017, J. Comput. Inf. Technol..

[33]  Engin Avci,et al.  Application of Similarity-Based Image Steganography Method to Computerized Tomography Images , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).

[34]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[35]  KokSheik Wong,et al.  Data embedding in random domain , 2015, Signal Process..

[36]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[37]  Hedieh Sajedi,et al.  Steganalysis based on steganography pattern discovery , 2016, J. Inf. Secur. Appl..

[38]  Rainer Steinwandt,et al.  Combined schemes for signature and encryption: The public-key and the identity-based setting , 2016, Inf. Comput..

[39]  Philip C. Ritchey,et al.  Synthetic steganography: Methods for generating and detecting covert channels in generated media , 2015 .

[40]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[41]  Weiming Zhang,et al.  Image camouflage by reversible image transformation , 2016, J. Vis. Commun. Image Represent..

[42]  Miguel Castelo-Branco,et al.  Distinct preference for spatial frequency content in ventral stream regions underlying the recognition of scenes, faces, bodies and other objects , 2016, Neuropsychologia.

[43]  Randa Atta,et al.  A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set , 2018, J. Vis. Commun. Image Represent..

[44]  Kevin Curran,et al.  An overview of steganography techniques applied to the protection of biometric data , 2017, Multimedia Tools and Applications.

[45]  Faramarz Sadeghi,et al.  Optimizing image steganography by combining the GA and ICA , 2015, ISC Int. J. Inf. Secur..

[46]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[47]  Jilei Zhou,et al.  Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimization , 2014, Commun. Nonlinear Sci. Numer. Simul..

[48]  Alexei A. Efros,et al.  The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[49]  Sarah V. Hart,et al.  Forensic Examination of Digital Evidence: A Guide for Law Enforcement , 2014 .

[50]  David Zhang,et al.  FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.

[51]  Ying He,et al.  Steganography with pixel-value differencing and modulus function based on PSO , 2018, J. Inf. Secur. Appl..

[52]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[53]  Stamatios V. Kartalopoulos,et al.  Annulling Traps & Fixed Traps in Chaos Cryptography , 2008, 2008 New Technologies, Mobility and Security.

[54]  S. Lippman,et al.  The Scripps Institution of Oceanography , 1959, Nature.

[55]  Muhammad Arslan Usman,et al.  Using image steganography for providing enhanced medical data security , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[56]  E. T. Sivadasan,et al.  Secure transmission of data by splitting image , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[57]  Shohreh Kasaei,et al.  Cellular learning automata-based color image segmentation using adaptive chains , 2009, 2009 14th International CSI Computer Conference.

[58]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[59]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[60]  P. Shanmugavadivu,et al.  FOSIR: Fuzzy-Object-Shape for Image Retrieval applications , 2016, Neurocomputing.

[61]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[62]  Karim Faez,et al.  Adaptive image steganography based on transform domain via genetic algorithm , 2017 .

[63]  Vijay H. Mankar,et al.  Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.

[64]  Savita Gupta,et al.  Image Recognition using Coefficient of Correlation and Structural SIMilarity Index in Uncontrolled Environment , 2012 .

[65]  Antonio Torralba,et al.  Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.

[66]  T. Gireeshkumar,et al.  Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains , 2016 .

[67]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[68]  Mladen D. Veinovic,et al.  A new way of covert communication by steganography via JPEG images within a Microsoft Word document , 2015, Multimedia Systems.

[69]  Leonardo Palacios-Luengas,et al.  Symmetric cryptosystem based on skew tent map , 2017, Multimedia Tools and Applications.

[70]  H. Noda,et al.  Application of bit-plane decomposition steganography to JPEG2000 encoded images , 2002, IEEE Signal Processing Letters.

[71]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .