LSB steganography with improved embedding efficiency and undetectability

In this paper, we propose a new method of non-adaptive LSB steganography in still images toimprove the embedding efficiency from 2 to 8/3 random bits per one embedding change even forthe embedding rate of 1 bit per pixel. The method takes 2-bits of the secret message at a timeand compares them to the LSBs of the two chosen pixel values for embedding, it always assumesa single mismatch between the two and uses the second LSB of the first pixel value to hold theindex of the mismatch. It is shown that the proposed method outperforms the security of LSBreplacement, LSB matching, and LSB matching revisited by reducing the probability ofdetection with their current targeted steganalysis methods. Other advantages of the proposedmethod are reducing the overall bit-level changes to the cover image for the same amount ofembedded data and avoiding complex calculations. Finally, the new method results in littleadditional distortion in the stego image, which could be tolerated.

[1]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[2]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[4]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[5]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[6]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[7]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[8]  Miroslav Goljan,et al.  Steganography via Codes for Memory with Defective Cells , 2022 .

[9]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[10]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[11]  Ingemar J. Cox,et al.  A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[12]  Ingemar J. Cox,et al.  Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.

[13]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[14]  Andrew D. Ker A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.

[15]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[16]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[17]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[18]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Ke Zhang,et al.  Stegananlysis Method of Two Least-Significant Bits Steganography , 2009, 2009 International Conference on Information Technology and Computer Science.

[20]  Florent Retraint,et al.  An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[22]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[23]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[24]  Eiji Kawaguchi,et al.  Principles and applications of BPCS steganography , 1999, Other Conferences.

[25]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[26]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[27]  Wei,et al.  Block-Based Adaptive Image Steganography Using LSB Matching Revisited , 2011 .

[28]  M. Hwang,et al.  (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .

[29]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[30]  Tao Zhang,et al.  Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[31]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[32]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[33]  Jessica J. Fridrich,et al.  On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.

[34]  Ingemar J. Cox,et al.  Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[35]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[36]  K. L. Shunmuganathan,et al.  Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate , 2012, Inf. Secur. J. A Glob. Perspect..

[37]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[38]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[39]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.