Onion steganography: a novel layering approach

This paper presents a novel layering approach of steganography which implements deception theory by utilizing three types of multimedia, in order to hide the data in video file. In the proposed technique first, audio stream of video file is analyzed and two features are extracted, active zone and silence zone. These features define method numbers where each method number corresponds to one cipher technique which exists in the literature. After selecting the ciphering method, we apply it on the plaintext. In the second layer, first we convert the ciphered text into arbitrary characters and hide the data using chaotic map by generating logo image. In the third layer, we multiply that image with orthogonal matrix which is selected on the basis of silence zones. In the fourth layer, we hide that logo image using DWT with security key. The security key is generated locally by using logistic map, and its initial condition is set on the basis of selected method number. Lastly we hide resultant image into the audio signal using wavelet transform and regenerate the video file. The proposed system is implemented in MATLAB 7.0.  Here, we analyzed the SNR values of the regenerated signal and other statistical results to prove that onion steganography works better than silence interval technique, LSB technique, echo hiding technique, magnitude technique and spectrum technique in many aspects.

[1]  S. Hemalatha,et al.  A Secure And High Capacity Image Steganography Technique , 2013, ArXiv.

[2]  Sanjit K. Mitra,et al.  Digital Signal Processing: A Computer-Based Approach , 1997 .

[3]  N. Wiener,et al.  Fourier Transforms in the Complex Domain , 1934 .

[4]  Jürgen Wurzer,et al.  A Novel Phase Coding Technique for Steganography in Auditive Media , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[5]  Norbert Wiener,et al.  Extrapolation, Interpolation, and Smoothing of Stationary Time Series , 1964 .

[6]  Tariq Shah,et al.  Stego optical encryption based on chaotic S-box transformation , 2014 .

[7]  Sajad Shirali-Shahreza,et al.  Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  El Mamoun Souidi,et al.  A New Steganographic Method For Grayscale Image Using Graph Coloring Problem , 2013 .

[9]  Long-Wen Chang,et al.  Data hiding for digital video with phase of motion vector , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[10]  Mihai V. Micea,et al.  Embedding Data in Video Stream using Steganography , 2007, 2007 4th International Symposium on Applied Computational Intelligence and Informatics.

[11]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[12]  Kwok-Wo Wong,et al.  Breaking a novel colour image encryption algorithm based on chaos , 2012, Nonlinear Dynamics.

[13]  Debashis Das,et al.  Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/ Underflow , 2012 .

[14]  Marc Moonen,et al.  On the output SNR of the speech-distortion weighted multichannel Wiener filter , 2005, IEEE Signal Processing Letters.

[15]  Sugata Sanyal,et al.  A Survey on Various Data Hiding Techniques and their Comparative Analysis , 2012, ArXiv.

[16]  Guodong Ye,et al.  Image scrambling encryption algorithm of pixel bit based on chaos map , 2010, Pattern Recognit. Lett..

[17]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[18]  Lihua Gong,et al.  Quantum image encryption based on generalized Arnold transform and double random-phase encoding , 2015, Quantum Information Processing.

[19]  Juan E. Tapiador,et al.  Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..

[20]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[21]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[22]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[23]  Ricardo López-Ruiz,et al.  Basin Bifurcations in a Two-Dimensional Logistic Map , 2003, nlin/0304059.

[24]  Sajjad Shaukat Jamal,et al.  An efficient scheme for digital watermarking using chaotic map , 2013 .

[25]  Gautam Sanyal,et al.  A Novel Audio Steganography Technique by M16MA , 2011 .

[26]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[27]  Hsien-Wen Tseng,et al.  A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number , 2013, J. Appl. Math..

[28]  Xing-Yuan Wang,et al.  A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice , 2014, Inf. Sci..

[29]  Alisha Arora,et al.  IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .

[30]  Fatiha Djebbar,et al.  Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..

[31]  Jonathan C. L. Liu,et al.  Prediction-based Reversible Data Hiding Using Empirical Histograms in Images , 2012, KSII Trans. Internet Inf. Syst..

[32]  Chien-Feng Huang,et al.  Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme , 2013, J. Inf. Hiding Multim. Signal Process..

[33]  B.Rajasekhar,et al.  Steganography Based on Integer Wavelet Transform and Bicubic Interpolation , 2012 .

[34]  Kamalpreet Kaur Multi-Level Steganographic Algorithm for Audio Steganography using LSB, Parity Coding and Phase Coding Technique , 2014 .

[35]  Guanrong Chen,et al.  Chaos-Based Image Encryption , 2005 .

[36]  R. S. Bhuvaneswaran,et al.  An intertwining chaotic maps based image encryption scheme , 2012 .

[37]  John G. Proakis,et al.  Digital Signal Processing: Principles, Algorithms, and Applications , 1992 .

[38]  Ronak Karimi,et al.  Audio Steganography: A Survey on Recent Approaches - TI Journals , 2012 .

[39]  Muhammad Fahad Khan,et al.  Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps , 2014, Circuits, Systems, and Signal Processing.

[40]  Gaurav Bhatnagar,et al.  A novel chaos-based secure transmission of biometric data , 2015, Neurocomputing.

[41]  Tapio Seppänen,et al.  Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[42]  M. Pooyan,et al.  LSB-based Audio Steganography Method Based on Lifting Wavelet Transform , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[43]  Sushanta Biswas,et al.  A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.

[44]  Xing-yuan Wang,et al.  Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .

[45]  Suvamoy Changder,et al.  Chaos based Edge Adaptive Image Steganography , 2013 .

[46]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[47]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[48]  Xiaomin Wang,et al.  An image scrambling encryption using chaos-controlled Poker shuffle operation , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[49]  John Gantz,et al.  The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .

[50]  Cryptography Navneet Singh Sikarwar A Model for Performance Enhancement of Steganography through Dynamic Key , 2012 .

[51]  Tai-hoon Kim,et al.  A method of data hiding in audio signal , 2012 .

[52]  Yu Zhang,et al.  Breaking a chaotic image encryption algorithm based on perceptron model , 2011, Nonlinear Dynamics.

[53]  J. Pieprzyk,et al.  Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model , 2014 .