A High Quality Steganographic Method Using Morphing

A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods. Keywords—Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality

[1]  Gandharba Swain,et al.  LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits , 2011 .

[2]  Chao-Hung Lin,et al.  A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.

[3]  Sanjay N. Talbar,et al.  Image Morphing Concept for Secure Transmission of Image Data Contents over Internet , 2010 .

[4]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[5]  G. Prasad,et al.  Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions , 2010 .

[6]  Qiangfu Zhao,et al.  Information Hiding Based on Image Morphing , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[7]  Hiromasa Suzuki,et al.  Metamorphosis of Arbitrary Triangular Meshes , 2000, IEEE Computer Graphics and Applications.

[8]  Ran-Zan Wang,et al.  High-payload image steganography using two-way block matching , 2006, IEEE Signal Processing Letters.

[9]  Nasir D. Memon,et al.  Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography , 2006, Trans. Data Hiding Multim. Secur..

[10]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[11]  Ying Wang,et al.  Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.

[12]  Phillip A. Regalia,et al.  Cryptographic Secrecy of Steganographic Matrix Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[13]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[14]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[15]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[16]  Xinpeng Zhang,et al.  Efficient Data Hiding With Plus-Minus One or Two , 2010, IEEE Signal Processing Letters.

[17]  Hedieh Sajedi,et al.  Secure steganography based on embedding capacity , 2009, International Journal of Information Security.

[18]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[19]  Satoshi Kondo,et al.  A Novel Steganographic Technique Based on Image Morphing , 2006, UIC.

[20]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[21]  Te-Ming Tu,et al.  A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..

[22]  Yao Zhao,et al.  Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..

[23]  Cheng-Hsiung Hsieh,et al.  Image Enhancement and Image Hiding Based on Linear Image Fusion , 2011 .

[24]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[25]  R. Shreelekshmi,et al.  Cover Image Preprocessing for More Reliable LSB Replacement Steganography , 2010, 2010 International Conference on Signal Acquisition and Processing.

[26]  K B Raja,et al.  HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM , 2009 .

[27]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[28]  Nameer N. El-Emam Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .

[29]  Mohamed A. Bamatraf,et al.  Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation , 2011, Int. Arab. J. e Technol..

[30]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[31]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[32]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[33]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[34]  H. B. Kekre,et al.  Increased Capacity of Information Hiding in LSB's Method for Text and Image , 2008 .