Image steganography using uncorrelated color space and its application for security of visual contents in online social networks

Abstract Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitability for steganographic algorithms. Therefore, in this paper, we propose an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility while minimizing the chances of detection by the human vision system. In the proposed scheme, the input image is passed through an image scrambler, resulting in an encrypted image, preserving the privacy of image contents, and then converted to HSV color space for further processing. The secret contents are encrypted using an iterative magic matrix encryption algorithm (IMMEA) for better security, producing the cipher contents. An adaptive LSB substitution method is then used to embed the encrypted data inside the V-plane of HSV color model based on secret key-directed block magic LSB mechanism. The idea of utilizing HSV color space for data hiding is inspired from its properties including de-correlation, cost-effectiveness in processing, better stego image quality, and suitability for steganography as verified by our experiments, compared to other color spaces such as RGB, YCbCr, HSI, and Lab. The quantitative and qualitative experimental results of the proposed framework and its application for addressing the security and privacy of visual contents in online social networks (OSNs), confirm its effectiveness in contrast to state-of-the-art methods.

[1]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[2]  Millie Pant,et al.  An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony , 2015, Inf. Sci..

[3]  Mohammad Rahmati,et al.  Adaptive image steganography using contourlet transform , 2013, J. Electronic Imaging.

[4]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[5]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[6]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[7]  Wei-Chung Cheng,et al.  Chromatic encoding: a low power encoding technique for digital visual interface , 2004, IEEE Transactions on Consumer Electronics.

[8]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[9]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[10]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[11]  Yuhui Zheng,et al.  Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..

[12]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[13]  François Cayre,et al.  Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.

[14]  Shahrokh Ghaemmaghami,et al.  Colour image steganography method based on sparse representation , 2015, IET Image Process..

[15]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[16]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[17]  Wojciech Mazurczyk,et al.  Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.

[18]  Sung Wook Baik,et al.  Efficient visual attention based framework for extracting key frames from videos , 2013, Signal Process. Image Commun..

[19]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[20]  George Stephanides,et al.  A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..

[21]  Jiachen Yang,et al.  Quality Index for Stereoscopic Images by Separately Evaluating Adding and Subtracting , 2015, PloS one.

[22]  Sung Wook Baik,et al.  Ontology-based Secure Retrieval of Semantically Significant Visual Contents , 2015, ArXiv.

[23]  Wisnu Jatmiko,et al.  The Effect of Electrocardiogram Signal Compression Using Beat Reordering and SPIHT on Automatic Sleep Stage Classification , 2012 .

[24]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[25]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[26]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Sung Wook Baik,et al.  Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems , 2016, SpringerPlus.

[28]  Yan Zheng,et al.  Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.

[29]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[30]  Der-Chyuan Lou,et al.  Steganographic Method for Secure Communications , 2002, Comput. Secur..

[31]  Sung Wook Baik,et al.  A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption , 2015, KSII Trans. Internet Inf. Syst..

[32]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[33]  Rafik Hamza,et al.  A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map , 2016, Inf. Secur. J. A Glob. Perspect..

[34]  Erkki Oja,et al.  PicSOM - content-based image retrieval with self-organizing maps , 2000, Pattern Recognit. Lett..

[35]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[36]  Jing Wang,et al.  Authentication and recovery algorithm for speech signal based on digital watermarking , 2016, Signal Process..

[37]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[38]  Javaid A. Sheikh,et al.  Data hiding in scrambled images: A new double layer security data hiding technique , 2014, Comput. Electr. Eng..

[39]  Ramadhan J. Mstafa,et al.  A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes , 2015, Multimedia Tools and Applications.

[40]  Sung Wook Baik,et al.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.

[41]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[42]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[43]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[44]  Sung Wook Baik,et al.  Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices , 2017, Multimedia Tools and Applications.

[45]  Khan Muhammad,et al.  A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model , 2015, ArXiv.

[46]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[47]  Asifullah Khan,et al.  A recent survey of reversible watermarking techniques , 2014, Inf. Sci..

[48]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[49]  Reza Safabakhsh,et al.  A new steganography method which preserves histogram: Generalization of LSB++ , 2014, Inf. Sci..

[50]  Gang Chen,et al.  Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.

[51]  Sung Wook Baik,et al.  Mobile-Cloud Assisted Video Summarization Framework for Efficient Management of Remote Sensing Data Generated by Wireless Capsule Sensors , 2014, Sensors.

[52]  Sung Wook Baik,et al.  Sparse Representations-Based Super-Resolution of Key-Frames Extracted from Frames-Sequences Generated by a Visual Sensor Network , 2014, Sensors.

[53]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[54]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[55]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[56]  Muhammad Ghulam,et al.  Detection of Voice Pathology using Fractal Dimension in a Multiresolution Analysis of Normal and Disordered Speech Signals , 2015, Journal of Medical Systems.

[57]  Sung Wook Baik,et al.  Evaluating the Suitability of Color Spaces for Image Steganography and Its Application in Wireless Capsule Endoscopy , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).