An intelligent chaotic embedding approach to enhance stego-image quality

Steganography's role in secret communication extends from concealing information to communication. As one of several possible approaches to embed confidential information in digital images, the Least Significant Bit (LSB) technique has been widely used; however, maintaining the imperceptibility of the stego-image is still a serious concern. In this paper, an Adaptive Random (AR) k-bit embedding approach has been attempted to enhance the quality of stego-images. The original cover is divided into nonoverlapping blocks of equal size. The encrypted confidential data are embedded in each block through four different random walks. The best random walk, which provides the minimum degradation for a particular block, is identified, and is fixed for that block. The decision on the fixed random walk for each block is recorded and kept as the secret key. The AR method has also been combined with the Inverted Pattern approach, referred to as the Adaptive Random Inverted Pattern (ARIP) approach, to further enhance the quality of the stego-image. The estimated Peak Signal to Noise Ratio (PSNR) value for the ARIP method yields 1dB enhancement.

[1]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[2]  Fenlin Liu,et al.  A review on blind detection for image steganography , 2008, Signal Process..

[3]  Chin-Chen Chang,et al.  Joint coding and embedding techniques for multimedia images , 2008, Inf. Sci..

[4]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[5]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[6]  Walter Bender,et al.  Applications for data hiding , 2000, IBM Syst. J..

[7]  H. Sagan Space-filling curves , 1994 .

[8]  Fan Zhang,et al.  The upper and lower bounds of the information-hiding capacity of digital images , 2008, Inf. Sci..

[9]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[10]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[11]  Qingzhong Liu,et al.  An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..

[12]  Tao Zhang,et al.  Steganalysis of LSB matching based on statistical modeling of pixel difference distributions , 2010, Inf. Sci..

[13]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[14]  Chin-Chen Chang,et al.  A reversible data hiding scheme using complementary embedding strategy , 2010, Inf. Sci..

[15]  Chin-Chen Chang,et al.  Lossless data hiding for color images based on block truncation coding , 2008, Pattern Recognit..

[16]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[17]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[18]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[19]  Andreas Westfeld Space filling curves in steganalysis , 2005, IS&T/SPIE Electronic Imaging.

[20]  Chin-Chen Chang,et al.  New image steganographic methods using run-length approach , 2006, Inf. Sci..

[21]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[22]  Chin-Chen Chang,et al.  A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..

[23]  Ki-Ryong Kwon,et al.  An Image Steganography Using Pixel Characteristics , 2005, CIS.

[24]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[25]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[26]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..