A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set

Abstract In this paper a steganographic method is proposed to improve the capacity of the hidden secret data and to provide an imperceptible stego-image quality. The proposed steganography algorithm is based on the wavelet packet decomposition (WPD) and neutrosophic set. First, an original image is decomposed into wavelet packet coefficients. Second, the generalized parent–child relationships of spatial orientation trees for wavelet packet decomposition are established among the wavelet packet subbands. An edge detector based on the neutrosophic set named (NSED) is then introduced and applied on a number of subbands. This leads to classify each wavelet packet tree into edge/non-edge tree to embed more secret bits into the coefficients in the edge tree than those in the non-edge tree. The embedding is done based on the least significant bit substitution scheme. Experimental results demonstrate that the proposed method achieves higher embedding capacity with better imperceptibility compared to the published steganographic methods.

[1]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Kiranpreet Kaur,et al.  Fuzzy Logic Based Image Edge Detection Algorithm in MATLAB , 2010 .

[3]  Ainuddin Wahid Abdul Wahab,et al.  Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images , 2016, Symmetry.

[4]  Long-Wen Chang,et al.  Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform , 2006, PSIVT.

[5]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[6]  Djemel Ziou,et al.  Edge Detection Techniques-An Overview , 1998 .

[7]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Lily R. Liang,et al.  Competitive fuzzy edge detection , 2003, Appl. Soft Comput..

[9]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[10]  Yanhui Guo,et al.  New neutrosophic approach to image segmentation , 2009, Pattern Recognit..

[11]  Florentin Smarandache,et al.  A unifying field in logics : neutrosophic logic : neutrosophy, neutrosophic set, neutrosophic probability , 2020 .

[12]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[13]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[14]  F. Smarandache A Unifying Field in Logics: Neutrosophic Logic. , 1999 .

[15]  Ainuddin Wahid Abdul Wahab,et al.  A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement , 2017, Signal Process. Image Commun..

[16]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[17]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[18]  Neetu Kushwaha Edge Detection using Fuzzy Logic in Matlab , 2012 .

[19]  Karim Faez,et al.  New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .

[20]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[21]  Hsien-Wen Tseng,et al.  High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion , 2014, IET Image Process..

[22]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[23]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .

[25]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[26]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[27]  Seyyed Amin Seyyedi,et al.  High Payload and Secure Steganography method Based on Block Partitioning and Integer Wavelet Transform , 2014 .

[28]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[29]  Himani Goyal,et al.  LSB Embedding in Spatial Domain - A Review of Improved Techniques , 2012, BIOINFORMATICS 2012.

[30]  Gautam Sanyal,et al.  Data Hiding in Images in Discrete Wavelet Domain Using PMM , 2010 .

[31]  T.M. Amarunnishad,et al.  A Fuzzy Complement Edge Operator , 2006, 2006 International Conference on Advanced Computing and Communications.

[32]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[33]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[34]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[35]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[36]  H. H. Zayed,et al.  An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.

[37]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[38]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[39]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[40]  Abdulkadir Sengür,et al.  A novel image edge detection algorithm based on neutrosophic set , 2014, Comput. Electr. Eng..

[41]  Hsien-Wen Tseng,et al.  A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number , 2013, J. Appl. Math..