A New Steganography Technique Using Magic Square Matrix And Affine Cipher

The need for methods to provide effective protection of data has become necessary due to the huge growth of multimedia applications on networks. Steganography is one of the most widespread approaches to protecting data. The challenge of steganographic methods is to create a rational balance between the quality of the file and the size of data that can be transferred. In addition, the robustness of the technique and security of the obscure data are key factors in determining the effectiveness of the algorithm. In this paper, a new steganography approach is proposed to fulfill the requirements of steganography which are imperceptibility, payload, and robustness. First, the cover image is converted from RGB color space to YCbCr color space. Then, Cb or Cr channel is selected to hide the secret data. The secret data is encrypted using Affine Cipher to increase its security. The Magic Square Matrix is applied to embed the secret code onto the Cb or Cr component using ISB (Intermediates Significant Bits) approach. Finally, the cover image is evaluated after applying the salt-and-pepper noise. The results show that the new proposed method not only improves the security of the payload but can also withstand against attacks.

[1]  Dennie Van Tassel,et al.  Cryptographic techniques for computers: Substitution methods , 1970, Inf. Storage Retr..

[2]  Juan Jose Roque SLSB: Improving the Steganographic Algorithm LSB , 2009, WOSIS.

[3]  Ravi Saini Review of Different Techniques of Image Steganography , 2014 .

[4]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[5]  Rudy Lauwereins,et al.  Robust stereo matching with fast Normalized Cross-Correlation over shape-adaptive regions , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[6]  Ali N. Akansu,et al.  Capacity estimates for data hiding in compressed images , 2001, IEEE Trans. Image Process..

[7]  Djemel Ziou,et al.  Image Quality Metrics: PSNR vs. SSIM , 2010, 2010 20th International Conference on Pattern Recognition.

[8]  J. Vijay Anand,et al.  New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security , 2011, ICCCS '11.

[9]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[10]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[11]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Scott R. Ellis Chapter 2 – A Cryptography Primer , 2013 .

[13]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[14]  Jianwen Luo,et al.  A fast normalized cross-correlation calculation method for motion estimation , 2010, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.

[15]  Neha Batra,et al.  Implementation of Modified 16×16 Quantization Table Steganography on Colour Images , 2012 .

[16]  E. Chang,et al.  Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.

[17]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[18]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[19]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[20]  M. Venkatesulu,et al.  Symmetric Key Cryptosystem Based on Randomized Block Cipher , 2010, 2010 5th International Conference on Future Information Technology.

[21]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[22]  Chai Peiqi,et al.  LPC Prediction Error Combined with LSB Steganography for Blind Speech Authentication , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[23]  Dominik Rutkowski,et al.  Modular design of information encipherment for computer systems , 1985, Comput. Secur..

[24]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[25]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[26]  Hassan Barada,et al.  A testbed for evaluating security and robustness of steganography techniques , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[27]  Fenlin Liu,et al.  Detecting LSB steganography based on dynamic masks , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[28]  Chin-Chen Chang,et al.  Secret Image Sharing Using Quadratic Residues , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[29]  Jan Platos,et al.  Compression of small text files , 2008, Adv. Eng. Informatics.

[30]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[31]  George Ghinea,et al.  Stego image quality and the reliability of PSNR , 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications.

[32]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..