A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model

2 Abstract: Image Steganography is the process of embedding text in images such that its existence cannot be detected by Human Visual System (HVS) and is known only to sender and receiver. This paper presents a novel approach for image steganography using Hue-Saturation-Intensity (HSI) color space based on Least Significant Bit (LSB). The proposed method transforms the image from RGB color space to Hue-Saturation-Intensity (HSI) color space and then embeds secret data inside the Intensity Plane (I-Plane) and transforms it back to RGB color model after embedding. The said technique is evaluated by both subjective and Objective Analysis. Experimentally it is found that the proposed method have larger Peak Signal-to Noise Ratio (PSNR) values, good imperceptibility and multiple security levels which shows its superiority as compared to several existing methods.

[1]  Rajarshi Pal,et al.  Image steganography using generalized base single digit sum (GB-SDS) , 2013, 2013 Annual IEEE India Conference (INDICON).

[2]  Zhou Wang,et al.  Multiscale structural similarity for image quality assessment , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.

[3]  Rosziati Ibrahim,et al.  Steganography Algorithm to Hide Secret Message inside an Image , 2011, ArXiv.

[4]  Khan Muhammad,et al.  A Secure Cyclic Steganographic Technique for Color Images using Randomization , 2015, ArXiv.

[5]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[6]  Alan C. Bovik,et al.  Making a “Completely Blind” Image Quality Analyzer , 2013, IEEE Signal Processing Letters.

[7]  Vijay Kumar,et al.  Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[8]  Mehdi Hussain,et al.  A Survey of Image Steganography Techniques , 2013 .

[9]  M. Chandrasekaran,et al.  A novel technique for image steganography using nonlinear chaotic map , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).

[10]  David Zhang,et al.  FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.

[11]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[12]  U. A. J. Pinidiyaarachchi,et al.  Image steganography scheme based on reversible data embedding strategy , 2013, 2013 8th International Conference on Computer Science & Education.

[13]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[14]  Rengarajan Amirtharajan,et al.  Standard deviation converges for random image steganography , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[15]  Pachiyappan Arulmozhivarman,et al.  High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.

[16]  Nadeem Akhtar,et al.  Enhancing the Security and Quality of LSB Based Image Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[17]  Md. Ismail Hossain,et al.  A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[18]  Yao Zhi-qiang A Watermarking Scheme Based on Wavelet Transform , 2003 .

[19]  Suvamoy Changder,et al.  Secure key based image realization steganography , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[20]  K.R. Venugopal,et al.  Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[21]  Zahoor Jan,et al.  Energy Based Coefficient Selection for Digital Watermarking in Wavelet Domain , 2010, ICICA.

[22]  Kai Zeng,et al.  Objective Quality Assessment for Image Retargeting Based on Structural Similarity , 2014, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[23]  Ravi K Sheth,et al.  Image Steganography Techniques , 2015 .

[24]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[25]  Manoj Kumar Ramaiya,et al.  Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[26]  Zahoor Jan,et al.  Genetic programming-based perceptual shaping of a digital watermark in the wavelet domain using Morton scanning , 2012 .

[27]  Richard Comley,et al.  Colour space effect on tracking in video surveillance , 2010 .

[28]  Arfan Jaffar,et al.  Watermarking scheme based on wavelet transform, genetic programming and Watson perceptual distortion control model for JPEG2000 , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[29]  Arvind Kumar,et al.  Steganography- A Data Hiding Technique , 2010 .

[30]  Amar Kumar Mohapatra,et al.  Digital Image Authentication Model Based on Edge Adaptive Steganography , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.

[31]  Sos S. Agaian,et al.  Quantifying image similarity using measure of enhancement by entropy , 2007, SPIE Defense + Commercial Sensing.