Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR) with an adaptive least significant bit (ALSB) is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns) and higher texture (asymmetry patterns) areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS) steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images) are conducted with recent least significant bit (LSB)-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits) while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR)).

[1]  Lihong Huang,et al.  A novel data hiding for color images based on pixel value difference and modulus function , 2014, Multimedia Tools and Applications.

[2]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[3]  Naixue Xiong,et al.  Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information , 2015, Symmetry.

[4]  Ali Hamzeh,et al.  A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.

[5]  Hsiao-Shan Huang,et al.  A combined image steganographic method using multi-way pixel-value differencing , 2015, International Conference on Graphic and Image Processing.

[6]  Chun-I Fan,et al.  Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security , 2015, Symmetry.

[7]  Ki-Hyun Jung,et al.  High-capacity steganographic method based on pixel-value differencing and LSB replacement methods , 2010 .

[8]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[9]  Ki-Hyun Jung,et al.  Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[10]  Karim Faez,et al.  New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .

[11]  Ingemar J. Cox,et al.  Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[12]  Lih-Chyau Wuu,et al.  Multi-Bit Data Hiding Scheme for Compressing Secret Messages , 2015 .

[13]  C. Ern Information hiding techniques for steganography and digital watermarking , 2018 .

[14]  Chin-Chen Chang,et al.  A novel multi-group exploiting modification direction method based on switch map , 2012, Signal Process..

[15]  S. Selvakumar,et al.  High payload image steganography with reduced distortion using octonary pixel pairing scheme , 2013, Multimedia Tools and Applications.

[16]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[17]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[18]  Cheonshik Kim,et al.  Data hiding by an improved exploiting modification direction , 2012, Multimedia Tools and Applications.

[19]  Hedieh Sajedi,et al.  HYSA: HYbrid steganographic approach using multiple steganography methods , 2011, Secur. Commun. Networks.

[20]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[21]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[22]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[23]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[24]  Chi-Yao Weng,et al.  Steganographic access control in data hiding using run-length encoding and modulo-operations , 2016, Secur. Commun. Networks.

[25]  Hayat Al-Dmour,et al.  Quality optimized medical image information hiding algorithm that employs edge detection and data coding , 2016, Comput. Methods Programs Biomed..

[26]  Saraju P. Mohanty,et al.  Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..

[27]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[28]  T-S Chen,et al.  A high payload hybrid data hiding scheme with LSB, EMD and MPE , 2015 .

[29]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[30]  Sos S. Agaian,et al.  Taxonomy for spatial domain LSB steganography techniques , 2014, Sensing Technologies + Applications.

[31]  Chien-Ping Chang,et al.  High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..

[32]  Yuan-Yu Tsai,et al.  Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding , 2014, Int. J. Netw. Secur..

[33]  Cheng-Hsing Yang,et al.  Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..

[34]  Xingming Sun,et al.  A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .

[35]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[36]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[37]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[38]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[39]  Li-Hong Huang,et al.  A data hiding scheme using pixel value differencing and improving exploiting modification directions , 2015, Comput. Secur..

[40]  Lionel Fillatre Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.

[41]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .