Hiding data inside images using orthogonal moments

In this contribution we propose a novel steganographic method based on several orthogonal polynomials and their combinations. The steganographic algorithm embeds a secrete message at the first eight coefficients of high frequency image. Moreover, this embedding method uses the Beta chaotic map to determine the order of the blocks where the secret bits will be inserted. In addition, from a 128-bit private key and the steps of a cryptography algorithm according to the Advanced Encryption Standard (AES) to generate the key expansion, the proposed method generates a key expansion of 2560 bits, with the purpose to permute the first eight coefficients of high frequency before the insertion. The insertion takes eventually place at the first eight high frequency coefficients in the transformed orthogonal moments domain. Before the insertion of the message the image undergoes a series of transformations. After the insertion the inverse transformations are applied to the original transformations in reverse order. The experimental work on the validation of the algorithm consists of the calculation of the Peak Signal-to-Noise Ratio (PSNR), the Universal Image Quality Index (UIQI), the Image Fidelity (IF), and the Relative Entropy (RE), comparing the same characteristics for the cover and stego image. The proposed algorithm improves the level of imperceptibility and security analyzed through the PSNR and RE values, respectively.

[1]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[2]  Hongqing Zhu,et al.  Image representation using separable two-dimensional continuous and discrete orthogonal moments , 2012, Pattern Recognit..

[3]  Debasis Giri,et al.  Secured steganographic scheme for highly compressed color image using weighted matrix through DCT , 2018 .

[4]  覃征,et al.  Objective Image Fusion Quality Evaluation Using Structural Similarity , 2009 .

[5]  Senlin Yan,et al.  Bivariate Hahn moments for image reconstruction , 2014, Int. J. Appl. Math. Comput. Sci..

[6]  Arun Kumar Sangaiah,et al.  Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..

[7]  Roberto Cusani,et al.  Peak-Shaped-Based Steganographic Technique for JPEG Images , 2009, EURASIP J. Inf. Secur..

[8]  S. Brandt,et al.  Special Functions of Mathematical Physics , 2011 .

[9]  Samir Kumar Bandyopadhyay,et al.  LSB Layer Independent Robust Steganography using Binary Addition , 2016 .

[10]  Eko Hari Rachmawanto,et al.  Secure Image Steganography Algorithm Based on DCT with OTP Encryption , 2017 .

[11]  Nikita J. Kulkarni,et al.  A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform , 2017, Alexandria Engineering Journal.

[12]  Ibrahim Kamel,et al.  Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach , 2017, Multimedia Tools and Applications.

[13]  Rene F. Swarttouw,et al.  Hypergeometric Orthogonal Polynomials , 2010 .

[14]  Safwan El Assad,et al.  Enhancement using chaos of a steganography method in DCT domain , 2015, 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).

[15]  Abdelwahab K. Alsammak,et al.  Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3 , 2017, Ain Shams Engineering Journal.

[16]  Yao Zhao,et al.  PM1 steganography in JPEG images using genetic algorithm , 2008, Soft Comput..

[17]  Rachid Benouini,et al.  3D image analysis by separable discrete orthogonal moments based on Krawtchouk and Tchebichef polynomials , 2017, Pattern Recognit..

[18]  Ming-Kuei Hu,et al.  Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.

[19]  Umesh Ghanekar,et al.  Image steganography based on Canny edge detection, dilation operator and hybrid coding , 2018, J. Inf. Secur. Appl..

[20]  Madhumita Sengupta,et al.  A Novel Hash based Technique for Thermal Image Authentication , 2013 .

[21]  Nur Azman Abu,et al.  Using tchebichef moment for fast and efficient image compression , 2010, Pattern Recognition and Image Analysis.

[22]  Barnali Gupta Banik,et al.  Novel Text Steganography Using Natural Language Processing and Part-of-Speech Tagging , 2020 .

[23]  Tanveer J. Siddiqui,et al.  A Security Enhanced Robust Steganography Algorithm for Data Hiding , 2012 .

[24]  Bartek Rajwa,et al.  A numerical recipe for accurate image reconstruction from discrete orthogonal moments , 2007, Pattern Recognit..

[25]  Huazhong Shu,et al.  Medical Image Blind Integrity Verification with Krawtchouk Moments , 2018, Int. J. Biomed. Imaging.

[26]  Jan Flusser,et al.  Fast computation of Krawtchouk moments , 2014, Inf. Sci..

[27]  Peyman Ayubi,et al.  A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..

[28]  Bing Hu,et al.  Local Feature Extraction Property of Krawtchouk Moment , 2013 .

[29]  Randa Atta,et al.  A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set , 2018, J. Vis. Commun. Image Represent..

[30]  Yu Cao,et al.  An Adaptive Audio Steganography for Covert Wireless Communication , 2018, Secur. Commun. Networks.

[31]  Dimitris E. Koulouriotis,et al.  Image watermarking via separable moments , 2013, Multimedia Tools and Applications.

[33]  V. B. Uvarov,et al.  Classical Orthogonal Polynomials of a Discrete Variable , 1991 .

[34]  Sim Heng Ong,et al.  Image Analysis by Tchebichef Moments , 2001, IEEE Trans. Image Process..

[35]  Kapil Sharma,et al.  Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map , 2018, Optik.

[36]  J. K. Mandal,et al.  A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .

[37]  Rim Zahmoul,et al.  Image encryption based on new Beta chaotic maps , 2017 .

[38]  S. M. Elshoura,et al.  A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments , 2013, Signal Process. Image Commun..

[39]  T. Gireeshkumar,et al.  Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains , 2016 .

[40]  Abid Yahya,et al.  Secured and robust information hiding scheme , 2013 .

[41]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[42]  S. M. Elshoura,et al.  High capacity blind information hiding schemes using Tchebichef moments , 2010, 2010 2nd International Conference on Future Computer and Communication.

[43]  Peyman Ayubi,et al.  An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..

[44]  Raveendran Paramesran,et al.  Image analysis by Krawtchouk moments , 2003, IEEE Trans. Image Process..

[45]  Pradeep M. Patil,et al.  Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..

[46]  M. Teague Image analysis via the general theory of moments , 1980 .

[47]  Aparajita Ojha,et al.  Chaotic system-based secure data hiding scheme with high embedding capacity , 2018, Comput. Electr. Eng..

[48]  Safya Belghith,et al.  A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.

[49]  Raveendran Paramesran,et al.  Image Analysis Using Hahn Moments , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[50]  Ibrahim Kamel,et al.  High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.

[51]  Leonardo Palacios-Luengas,et al.  A steganographic method using Bernoulli's chaotic maps , 2016, Comput. Electr. Eng..

[52]  Suvamoy Changder,et al.  Chaos based Edge Adaptive Image Steganography , 2013 .

[53]  Anier Soria Lorente,et al.  Steganographic algorithm of private key on the domain of the cosine discrete transform , 2016 .

[54]  Hassan Qjidaa,et al.  Image analysis using separable discrete moments of Charlier-Hahn , 2014, Multimedia Tools and Applications.

[55]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[56]  Anier Soria-Lorente,et al.  A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information , 2017, Secur. Commun. Networks.

[57]  Swathi Karri,et al.  Steganographic algorithm based on randomization of DCT kernel , 2014, Multimedia Tools and Applications.

[58]  Yih-Kai Lin,et al.  A data hiding scheme based upon DCT coefficient modification , 2014, Comput. Stand. Interfaces.

[59]  Christian Cachin,et al.  An information-theoretic model for steganography , 2004, Inf. Comput..