Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors

In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.

[1]  Colin K. Lee Infrared Face Recognition , 2006, Encyclopedia of Multimedia.

[2]  James V. Candy,et al.  Adaptive and Learning Systems for Signal Processing, Communications, and Control , 2006 .

[3]  Fatema Akhter A Novel Approach for Image Steganography in Spatial Domain , 2015, ArXiv.

[4]  Rajeev Kumar,et al.  A reversible high capacity data hiding scheme using pixel value adjusting feature , 2014, Multimedia Tools and Applications.

[5]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[6]  A.I. Hashad,et al.  A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.

[7]  Jianzhong Li,et al.  An Adaptive and Secure Holographic Image Watermarking Scheme , 2019, Entropy.

[8]  Olivier Déforges,et al.  Fast and Secure Chaos-Based Cryptosystem for Images , 2016, Int. J. Bifurc. Chaos.

[9]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[10]  Safwan El Assad,et al.  Enhancement using chaos of a steganography method in DCT domain , 2015, 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).

[11]  Mohammad Saniee Abadeh,et al.  Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..

[12]  Vladimir Vapnik,et al.  An overview of statistical learning theory , 1999, IEEE Trans. Neural Networks.

[13]  Safwan El Assad,et al.  Design and efficient implementation of a chaos-based stream cipher , 2017 .

[14]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[15]  Phalguni Gupta,et al.  Edge-based image steganography , 2014, EURASIP J. Inf. Secur..

[16]  Xing-Zhou Zhang,et al.  An image encryption scheme based on new spatiotemporal chaos , 2013 .

[17]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[18]  Xiaofeng Song,et al.  Steganalysis of perturbed quantization steganography based on the enhanced histogram features , 2014, Multimedia Tools and Applications.

[19]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[20]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[21]  Patrick Siarry,et al.  Differential evolution algorithm for the selection of optimal scaling factors in image watermarking , 2014, Eng. Appl. Artif. Intell..

[22]  Safwan El Assad,et al.  A new chaos-based image encryption system , 2016, Signal Process. Image Commun..

[23]  XiongNaixue,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016 .

[24]  Khan Muhammad,et al.  A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images , 2016, ArXiv.

[25]  Krasimir Kordov,et al.  Least Significant Bit Steganography using Hitzl-Zele Chaotic Map , 2017 .

[26]  Gandharba Swain,et al.  Steganography using two sided, three sided, and four sided side match methods , 2013, CSI Transactions on ICT.

[27]  Swathi Karri,et al.  Steganographic algorithm based on randomization of DCT kernel , 2014, Multimedia Tools and Applications.

[28]  Tao Zhang,et al.  Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[29]  A.A. Abdelwahab,et al.  A discrete wavelet transform based technique for image data hiding , 2008, 2008 National Radio Science Conference.

[30]  Wei Li,et al.  Image steganography based on subsampling and compressive sensing , 2014, Multimedia Tools and Applications.

[31]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[32]  Ki-Hyun Jung,et al.  Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[33]  Safwan El Assad,et al.  Stéganographie basée chaos pour assurer la sécurité de l'information , 2015 .

[34]  Safwan El Assad,et al.  Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[35]  Weimin Ouyang,et al.  Protect fragile regions in steganography LSB embedding , 2010, 2010 Third International Symposium on Knowledge Acquisition and Modeling.

[36]  Karim Faez,et al.  Entropy-Based Video Steganalysis of Motion Vectors , 2018, Entropy.

[37]  Mohammad Abu Taha Real-Time and Portable Chaos-based Crypto-Compression Systems for Efficient Embedded Architectures , 2017 .

[38]  R.T. McKeon,et al.  Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[39]  Rajesh Samata,et al.  An Enhanced Image Steganography Technique using DCT, Jsteg and Data Mining Bayesian Classification Algorithm , 2015 .

[40]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[41]  Olivier Déforges,et al.  Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[42]  Mohammad Rahmati,et al.  An efficient steganographic framework based on dynamic blocking and genetic algorithm , 2014, Multimedia Tools and Applications.

[43]  R. R. Sedamkar,et al.  A Modified High Frequency Adaptive Security Approach using Steganography for Region Selection based on Threshold Value , 2016 .

[44]  Ajit Danti,et al.  Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography , 2010 .

[45]  Ahmed Raza Rajput,et al.  Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis , 2019, Entropy.

[46]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[47]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[48]  Monika Gambhir,et al.  Arnold Transform Based Steganography , 2013 .

[49]  Olivier Déforges,et al.  Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[50]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .