+ All Categories
Home > Documents > CHAPTER II: RANDOM IMAGE STEGANOGRAPHY REVIEW...

CHAPTER II: RANDOM IMAGE STEGANOGRAPHY REVIEW...

Date post: 06-Mar-2018
Category:
Upload: lyque
View: 222 times
Download: 0 times
Share this document with a friend
50
16 CHAPTER II: RANDOM IMAGE STEGANOGRAPHYREVIEW 2.1. INTRODUCTION In the current corporate scenario data or information security is the most significant asset because loss of information will lead to financial and market loss which in turn will result in the end of business. Though security guards like cryptography, watermarking and steganography have armed the electromagnetic pathway against hackers, the concern on data protection is growing in parallel with the up-to-the-minute electronic technology. In this review, the role, strength and weakness of steganography and different random image steganography techniques in protecting the data have been analyzed and in addition how random techniques can be made smarter and effective have also been explored. Gone are the days when images were only about memories of the past. The images now speak more than that because of the advent of the field of image steganography [4], which embeds confidential information in images imperceptible to the naked human eye. From time immemorial emphasis on new techniques for clandestine communication has been given high importance based on the levels of confidentiality required. The three interlinked techniques namely cryptography [1], steganography and watermarking [2] form the base for secure communications. While cryptography involves making the content undecipherable, the other two are information hiding methods where the mere presence of information is hidden [27]. Since these three techniques are interlinked and confusing for those who are from different disciplines, it is better to distinguish cryptography, steganography and watermarking in the initial phase of the
Transcript

16

CHAPTER II: RANDOM IMAGE STEGANOGRAPHY– REVIEW

2.1. INTRODUCTION

In the current corporate scenario data or information security is the most

significant asset because loss of information will lead to financial and market loss which

in turn will result in the end of business. Though security guards like cryptography,

watermarking and steganography have armed the electromagnetic pathway against

hackers, the concern on data protection is growing in parallel with the up-to-the-minute

electronic technology. In this review, the role, strength and weakness of steganography

and different random image steganography techniques in protecting the data have been

analyzed and in addition how random techniques can be made smarter and effective have

also been explored.

Gone are the days when images were only about memories of the past. The

images now speak more than that because of the advent of the field of image

steganography [4], which embeds confidential information in images imperceptible to the

naked human eye. From time immemorial emphasis on new techniques for clandestine

communication has been given high importance based on the levels of confidentiality

required. The three interlinked techniques namely cryptography [1], steganography and

watermarking [2] form the base for secure communications. While cryptography involves

making the content undecipherable, the other two are information hiding methods where

the mere presence of information is hidden [27]. Since these three techniques are

interlinked and confusing for those who are from different disciplines, it is better to

distinguish cryptography, steganography and watermarking in the initial phase of the

17

review. Table 2.1 details the differences among steganography, watermarking and

cryptography.

A Schematic diagram of the proposed study to classify existing information

security is given in Fig. 2.1.

Table 2.1. Differences among Steganography, Watermarking and Cryptography

Property Steganography Watermarking Cryptography

Carrier ,

secret data,

key and

output

The payload is

embedded in any

digital media with an

optional key and is

called as the stego-file

The water mark is

embedded in

image/audio files

and is called as the

watermarked-file

The information is

encrypted in text or

image files and

output is called as

the cipher-text

Selection of

cover

Any cover can be

chosen

Restriction in cover

selection

N/A

Objective and

concern

Capacity is a major

concern for the secret

communication aided

by steganography

Robustness is a

necessary feature of

copyright

preservation

Robustness is

essential for data

protection

Detection and

retrieval

The cover is not needed

for recovery and full

retrieval of data is

possible

Data is retrieved by

cross-correlation and

the original cover is

required for the

same

Full retrieval of

data without the

need of the cover

Relation to

cover and

visibility

The information is not

generally related to the

cover and is never

perceptible to the

normal human vision

Watermarks are

sometimes visible to

human eye and

usually becomes an

attribute of the

image

Due to encryption,

we can easily know

that there is hidden

data but

deciphering is

difficult

Attacks Steganalysis detects the

presence of information

Image processing

aids in removal

/replacement of

watermarks

Cryptanalysis de-

ciphers the

encrypted

information

18

2.1.1. The triplets of security

Three technologies define the possibilities of data hiding. They are:

Cryptography

Steganography

Watermarking

Cryptography is a technique in which the secret message is encrypted and sent in

an unintelligent format. It scrambles the confidential data in such a way that it appears to

be gibberish to any unintended user. The confidential data to be communicated is a

mixture of permutations and substitutions and hence any third party other than the

legitimate user cannot access the message. Furthermore, cryptography [1] could be

LINGUISTIC

WATERMARKING

FRAGILE ROBUST

AUDIO VIDEO TEXT

INFORMATION SECURITY

STEGANOGRAPHY

TECHNICAL

COVER

S

IMAGE

TIME DOMAIN FREQUENCY DOMAIN

METHOD

S

CRYPTOGRAPHY

SYMMETRIC KEY PUBLIC KEY

Figure 2.1. Various sub-disciplines of information security

19

carried out using single key (Symmetric Key Cryptography) or using two keys (Public

Key Cryptography). Symmetric key cryptography employs the same key for encryption

and decryption of the plain text, whereas the asymmetric or better known as public key

cryptography uses a public key for encryption of the plain text and private key to decrypt.

The Data Encryption Standard (DES) is the best example for symmetric key

cryptography, which involves 56 bit key and 64 bit input with 16 rounds. Triple-DES,

International Data Encryption Algorithm (IDEA) and Bluefish are other well known

alternatives. Later, in 1976, Whitfield Diffie and Martin Hellman [28] developed the

public key cryptography, showing that it was impossible to deduce the private key from

the public key, and this presence of two keys made the algorithm secure. The RSA

algorithm developed by Ron Rivest, Adi Shamir and Leonard Adleman in 1978 was

another model of public key cryptography [29]. Public key cryptography is mainly used

for encryption algorithm and to develop digital signature [30, 31].

Steganography is an art of embedding the confidential information within some

other file generally known as the cover [32, 33]. The main objective of steganography is

to provide a covert communication between any two users such that an unintended person

does not gain access to the information by just glancing at the cover file [5, 33].

Steganography is different from cryptography [27] and the basic difference being that the

latter scrambles the data while the former just hides its presence. Steganography rather

hides the data whereas cryptography encrypts the data. Steganography provides much

more security when compared to cryptography because there is no chance of any

unintended user to know that a message is being sent whereas in cryptography, there will

20

always be a suspicion that a message is being sent. Hence these are more prone to be

hacked or suppressed.

Watermarking is generally used for authentication and copyrights protection [34-

42]. Watermarking can be used for creating an image so that it is recognizable. It can also

be used to mark a digital file so that it is intended to be visible (visible watermarking) or

visible only to its creator (invisible marking). The main purpose of watermarking is to

prevent the illegal copying or claim of ownership of digital media. The earlier

cryptography and recent steganography could be used for private communication, usually

for peer to peer communication, but watermarking is employed between one to many,

i.e.; same watermark is embedded in many covers. Fingerprinting is a special type of

watermarking, which would embed label and serial number to identify a unique copy

among several. A number of surveys on watermarking methods [37-42] are available in

literature and each aims to highlight the growth of watermarking method in multimedia

[38], wavelet transforms [39], digital images [40], for authentication [41] and digital

watermarking [42].

2.1.2. Characteristic comparison of the triplet

The common characteristics among steganography, cryptography and

watermarking is that they transmit the secret information in such a way that only the

receiver would decrypt or extract the confidential data [6, 43]. These techniques which

had been prevalent during the ancient times have been transported to the digital world. It

has become nearly impossible to extract or detect the secret messages.

In digital domain, steganography and watermarking would tie themselves and are

extremely used in digital images, but they have other uses as well; both cannot exist by

21

themselves, and hence require cover objects. Steganography requires a cover media to

carry the secret information and watermarking requires a carrier object which is intended

to be protected. These similarities create a link within them, and some modifications can

lead the transportation from one technique to another. Due to the similarities present

between the two, it is difficult to distinguish both of them, but there is a remarkable

difference between them.

Cryptography encrypts data in two methods namely secure or unbreakable (e.g.

One-time pad) systems and breakable (e.g. RSA) systems. Through both the systems,

communication carried out is known to all. However, it is time consuming and often

fruitless to crack a code. The robustness of the code lies in the difficulties faced while

reversing the code in different permutations and combinations. Due to its robustness, it is

used for security purposes. For example, cryptography is used for online shopping,

banking, etc. The credit card number, expiry, etc. and other crucial information are

encrypted and sent so that an unintended user can‟t access the details.

Steganography offers high carrier capacity keeping embedded message invisible,

thus maintaining the fidelity of the cover media. The efficiency of the steganographic

method is that one shouldn‟t know that a media file has been altered in order for

embedding. If the malicious user knows that there is some alteration, the steganographic

method is defeated and less efficient. The embedded message is very fragile and hence if

any modification is done to the stego image the whole secret message is corrupted. The

effectiveness lies in the ability to fool an unintended user. The layers of communication

can be more than one layer. A secret message can be embedded with a digital image

which in turn can be embedded within another digital media or video clippings.

22

Watermarking is required for the authentication and copyright protection of

digital files. The embedded watermarking is required in an object to make it impossible

to remove completely. If the embedded watermarking is removed, then the marked object

is either distorted or destroyed making it useless for anyone. This is the reason why

watermarking is more robust [2], compared to the other image processing techniques

such as compression, cropping, rotation, etc. Hence, even if a tiny bit of information is

extracted by modification and tampering, the rightful owner can still claim ownership.

Unlike steganography, it is acceptable for everyone to see the watermark embedded in it

including the invisible ones.

2.1.3. A clever mix of the triplet - An illustration

Cryptography is used as a paisano of the other two data hiding techniques. Data is

encrypted in both the techniques, to avoid statistics-based attacks and to increase the

randomness of steganography and to protect the hidden data in watermarking. In general,

confidential information is encrypted prior to embedding.

The importance of watermarking can be stated as follows. Suppose Rs.100 bills

are introduced in December 2009, then watermarking is implemented in order to prevent

illegal copies. Identify the original from fake, when the bill is shown in light a small

image will appear within the large image. The watermarking is actually a part of the large

paper and is visible on both sides. Hence, it becomes difficult to produce a paper with

such features. In addition to these features, some tiny writings which are invisible to the

human eyes are present in the paper.

A banker having the necessary equipments (magnifying glass) can tell the

difference between the original bill and the fake bill. Steganography makes its play here.

23

The tiny printing done on the bill represents steganography .The tiny printing done in the

paper cannot be copied since any commercial printer is incapable of printing such a fine

and thin print leading to black spots. These are the reasons why steganography is used for

high security.

Cryptography is also implemented in the bill. A serial number is printed on the

bill, which may contain information about the location and date the bill was printed and

any other confidential information. The unique serial number for each bill can be used for

tracking purposes. Using steganography, cryptography and watermarking it becomes

impossible to reproduce Rs.100 bill. It must be kept in mind that all three are different

and have different functionality.

Since the main objective of this review is to explore more on random image

steganography, further researches on cryptography and watermarking are not explained in

detail.

2.1.4. History of steganography

Steganography, derived from Greek words meaning „covered writing‟ has been in

use over the past thousands of years [2, 4, 6 - 10]. For example, secret writing of the

Chinese was reinvented by the Italian mathematician Jerome Cardan and included a paper

mask with holes between both the sender and receiver, with the secret message written by

keeping the paper mask on a blank sheet. Later, the blank is filled to appear as innocuous

text and this method is called as Cardan Grille [44].

The Nazis invented several steganographic methods during the World War II

using invisible ink and null ciphers and microdots. An example can be given as follows:

“Apparently neutral‟s protest is thoroughly discounted and ignored. Isman hard hit.

24

Blockade issue affects pretext for the embargo on by-products, ejecting suets and

vegetable oils.” is a message sent by a Nazi spy, which when decoded using the second

letters reveals the secret message „Pershing's sails from NY June 1‟. Another interesting

case is wherein Morse code was concealed in a drawing in the form of long grass and

short grass in the year 1945 [45, 46].

Various methods are implemented to obliterate the existence of the secret

message. A bunch of such techniques includes invisible ink, character arrangement,

microdots, digital signatures and spread spectrum. More details on the history of

steganography are available in [2, 4, 6 - 10].

2.1.5. Digital steganography

This prowess of secret communication coined as steganography means “covered

writing”. From the aforementioned ancient methods, steganography has made a giant leap

to the digital form as well due to the enormous improvement in computing power, the

internet and advancements in digital signal processing.

While the ambit of steganography is immense, it has been mainly used for secret

communication. Although steganography and cryptography both cater to the same

purpose, the advantage of the former over the latter is that it obliterates the existence of

the confidential message.

Steganography, the most promising area in information security, has

revolutionized the digital sphere that the world has become now. Initially, digital

steganography has been stated by Simmons in his famous prisoner‟s problem paper [11]..

Later, in 1997, the first International Conference on Information Hiding organized by

Ross Anderson defined the necessities for steganography [13]. Even today people suspect

25

that the hidden communication would aid terrorists to share an illegal plan or an attack

[6]. Despite the facts that were attributed to the failure, it was evident that steganography

is not only practiced in still images but in audio and video also. Examples exist in [47,

48] for hiding data in music files, and even in a simpler form such as in Hyper Text

Markup Language(HTML), executable files(EXE) and extensible Markup Language

(XML) [49]. But steganography has given rise to several applications and corporate

vigilance standards and measures.

Contemporary methods of information hiding are due to Simmons [11]. Kurak

and McHugh discussed a method [50], which is similar to embedding into the 4 least

significant bits (LSBs). They examined image downgrading and contamination, which

are known now as image based steganography [4, 14].

A detailed survey on steganographic tools in other media from a forensic

investigator‟s perspective is available in the literature[51]. Steganography is widely used

for secret communication purposes, and a continuous evolution is guaranteed due to its

applications.

2.1.6. Steganography applications

Steganography is a field which finds its application in almost all domains, since

security and confidentiality is of prime importance, be it a simple email to a friend or a

company‟s confidential data [2, 4, 6]. The various applications are detailed as follows:

For copyright control of materials [40, 51].

To maintain the confidentiality and integrity of company‟s secrets [52-54].

For making smart IDs with personal details embedded in the photographs [55].

To aid in video-audio synchronisation [57-60].

26

To append additional information in TV broadcasting [61, 62].

In TCP/IP packets wherein a unique ID is embedded into an image to analyze the

network traffic of specific users [63-66].

Petitcolas' contribution to the medical field with the help of steganography is

remarkable, and it aids in maintaining the patients‟ records more safely and also avoids

mix-up leading to confusion [2]. His main application in medical imaging systems was

embedding the patient‟s data into their image data like X-ray reports. This helps in

maintaining a link between the image data and the personal information and the chances

of reports of two or more patients getting mixed up is removed, thus providing an

ultimate guarantee of authentication, which is essential. An LSB embedding technique

for the electronic patient records [67], is based on multiple-base data hiding wherein the

base is the pixel value difference between the original image and its JPEG version. Few

more patient data concealment in digital images is detailed in the literature[68, 69]. A

review of the impact of data privacy and confidentiality on developing telemedicine

applications is available [70].

A more sophisticated application of information hiding would be embedding data

into a printed picture which would be unperceivable by the naked eye, while a mobile

phone with a camera could decode it. The Japanese firm Fujitsu is developing a

technology based on the idea of transforming the image colour scheme into its Hue,

Saturation and Value (HSV)components and embedding in the Hue domain which is

insensitive to human vision [4, 71]. This decoding takes just less than one second as the

embedded data is merely 12 bytes. This could be implemented for “doctor‟s

27

prescriptions, food wrappers, billboards, business cards and printed media such as

magazines and pamphlets” [72], or to replace barcodes.

“Appearances may be deceptive” is the most apt phrase to be used for the

contemporary digital technology in which the chances of forgery are high [73]. This has

led to a new vast field of research namely digital document forensics. Chaddad Abbas has

proposed a security scheme which protects scanned documents from forgery using self-

embedding techniques [74]. This method detects forgery and also allows legal or

forensics experts to gain access to the original document despite the manipulation used.

Any advancement in science would certainly have a disadvantage. In this case, the

concern was about the usage of steganography by terrorists for secret plots, which is also

called as cyber planning or digital menace [2]. Hence, Provos and Honeyman [75]

subjected three million images from popular websites to intense scrutiny for any presence

of hidden data but were unsuccessful.

To justify the popularity of the chosen review topic, a simple search has been

conducted to survey the number of articles published in referred and peer-reviewed

journals and number of patents filed in various patent offices throughout the world, with

the search key word steganography, and the results are presented in Table 2.2, 2.3 and

2.4.

Search Key word: Steganography

Web search sources: Science Direct, SCOPUS, IEEE, Springer, DOAJ, Citeseer,

Sciverse, ACM Portal and Google Scholar

28

Table 2.2. Year wise publication details

Table 2.3. Total number of publications in web search

Steganography as keyword Total number of papers

Springer 1261

Scopus 2835

IEEE 1618

Science Direct 883

DOAJ 280

Citeseer 2543

Sciverse 30225

ACM Digital Library 508

Google Scholar 19100

Table 2.4. Total number of patents filed in various patent offices

Patent Offices (PO)

4070

USA

PO

1604 WIPO 277 Europe

PO

114 UK

PO

23 Japan

PO

17

Tables 2.2, 2.3 and 2.4 confirm that, year by year the number of papers published in the

chosen field of study has considerably increased.

In addition, there are two popular review / survey papers available in the existing

literature for steganography [4, 6], but both did not specify anything about random image

YEAR 1997 ’98 ’99 2000 ’01 ’02 ’03 ’04 ’05 ’06 ’07 ’08 ’09 ’10 ’11

/12

TOTAL

NO OF

PAPERS

Science

Direct

8 15 7 9 17 60 42 33 60 53 76 101 128 117 132

/13

883

Scopus 4 17 16 20 40 54 78 155 165 215 260 325 433 600 453 2835

IEEE 2 11 9 17 29 36 55 77 75 123 168 242 317 299 157 1617

Springer 8 15 5 19 7 6 19 55 167 118 112 137 163 158 272 1261

29

steganography. Hence in this chapter, the present status and future direction for random

image steganography have been presented.

2.2. REVIEW ON STEGANOGRAPHY

As a part of the survey, this section aims at providing a bird‟s eye view of the

most important steganographic techniques available for digital images. Most of the

techniques exploit the structures of the formats like GIF, JPEG, etc., and few also make

use of the BMP format for its simple data structure.

A graphical representation shows the embedding process in the cover image.

Secret data is the confidential information to hide and the same is the extracted data,

Embed is the steganographic function and the stego-image is transferred through the

channel, and key represents an optional key: A simple data hiding frame work is shown

in Fig. 2.2.

2.2.1. Steganography classification - Stefan C. Katzenbeisser

In the belles-lettres of steganography with three standard protocols namely pure

steganography, secret key steganography and public-key steganography [2] is shown in

the Fig. 2.3.

Cover Object

o

Secret Data

Embed

Stego object in

Open Channel

Extract

Key

Secret

Data

Figure 2.2. A simple schematic diagram for data hiding framework

30

Pure steganography

This system includes the pure or unadulterated working principles of

steganography, wherein there is no prior transfer of shared secret key. But still the

purpose could be achieved.

In common terms, the embedding process in this mode of steganography is coined

and elaborated in terms of mapping in set theory, where let E be the embedding process,

C be the set of all cover images and M be the set of all possible images and is defined as

E: C×M C while the extraction process is denoted by D and is a mapping representing

D: C M, which depicts the extraction of secret message off the cover.

It is mandatory that | C | >= |M|, and the embedding and extraction algorithm must

be accessible to both transmitter and receiver, but to no one else.

Secret key steganography

As pure steganography relies completely on secrecy, it cannot be always baked

upon when the transfer is prone to lose secrecy, although the transfer is between E

(Embedding process) and D (Extraction process). This is not secure as it violates

kerckhoff‟s principle [12]. With this, secret key steganography could be implemented

with three stratified objects (A cover image “C”, secret message “M”, and a secret key

Figure 2.3. Katzenbeisser classification on steganography

31

“K”). The sender chooses random cover image, takes the secret message embeds it into

the cover image deploying the secret key K. And at the receiver end, if the secret key is

known, the secret message could be extracted from the stego image. And as obvious, any

person unaware of secret key has no scope of finding out the secret message.

Mathematically, with set notation, this is given as

EK: C×M×K →C and DK: C×K →M

where EK- Embedding with secret key and DK– Extraction with secret key K

Public key steganography

As the name suggests the encoding key is public key, which is visible to the

public database and everyone has access to it. So the embedding process is visible to

everyone. Here, the true receiver will also use a secret key D, which is the apt key for

decoding the secret message. So although the public key is known to the third person, the

message cannot be decoded until and unless the third person knows the secret key D.

2.2.2. Steganography classification - Johnson and Katzenbeisser

In addition a popular survey available on steganography by Johnson &

Katzenbeisser [2] is completely dedicated to image steganography and classifies these

techniques into six different methodologies as shown in the Fig. 2.5.

Figure 2.4. Johnson and Katzenbeisser classification on steganography

32

Substitution systems [76-80] – Confidential information has been substituted into

redundant parts of a cover image through random or raster scan.

Transform domain techniques [81-85] – Confidential data has been embedded

into selected transformed coefficients (frequency domain) of the cover image.

Spread spectrum techniques [86-90] – Spread spectrum concepts adapted to

embed the confidential information.

Statistical methods [91-95] – Embed confidential information by varying the

statistical properties of the cover, extraction would be carried through hypothesis

testing.

Distortion techniques [96-100] – Embed confidential information by distorting

the cover, for extraction in the receiver side compare it with cover object

Cover generation methods [101-104] – Generate a new cover from the

confidential information.

This survey neither provides test images of the analysis nor does it discuss

steganography‟s evolution or applications, but provides classification on steganography

methodologies adapted on the chosen cover object.

In the survey of Bailey et al., [105] an evaluation of software in spatial domain

supporting the GIF format is done. Here, steganography assumes the unavailability of the

original image and evaluation is done by a direct comparison of the original and the stego

images.

In the survey by Li et al., [106] image Steganography has been classified into

spatial and JPEG steganography method as shown in Fig. 2.5.

33

Spatial domain techniques further classified into six different methods are as

follows. Least Significant Bit (LSB) based steganography [5], Multiple Bit-planes Based

Steganography (MBPS) [107], Noise-adding Based Steganography (NABS) [108-110],

Prediction Error Based Steganography (PEBS) [111], Modulo Operation Based

Steganography (Mod) [112] and Quantization Based Steganography (QBS) [113]. The

other classification is JPEG steganography, which is further classified into JSteg [114] /

JPHide [115], F5 steganographic algorithm [19], OutGuess [116], model-based

steganography (MB) [117] and Yet Another Steganographic Scheme (YASS) [118]. This

review suggests on how to select pixel locations adaptively for embedding [119], how to

reduce embedding distortion and to increase embedding efficiency, embedding data in the

image creation process, sacrificing the imperceptivity, how to preserve the statistics while

embedding during image creation, but fails to suggest how to improve the randomness

while embedding.

In addition, Cheddas Abbas [4] categorized steganographic method as spatial

domain, frequency domain and the adaptive method's wherein adaptive methods can be

Figure 2.5. Li et al. classification on steganography

34

applied for both spatial and frequency domains. They also evaluated the performance of

commercially available software and its drawbacks and highlighted the need for novel

methods in image steganography. In the next section, some of the dominant techniques

exploiting the image formats are discussed.

2.2.3. Steganography methods in images

One simple image steganographic method is to append the secret data after the

End of File (EOF) tag in the image. The image remains intact and it cannot be perceived

in image viewers that some data is hidden. Whereas when it is opened in notepad, after

some random characters (which are the values of the image), the data is displayed

perfectly thus making it more prone to any steganalysis attack [4].

Another implementation involves appending the data to be hidden into the

image‟s Extended File Information (EXIF), a standard for digital cameras which is used

to store metadata-information about the image (such as the make and model of a camera,

the time the picture was taken and digitized, the resolution of the image, exposure time,

and the focal length) in the image header file. This suffers drawbacks similar to the

previous technique [120].

2.2.4. Image steganography in spatial domain

Spatial domain methods of steganography involve modifying both the secret data

and the cover medium involving embedding data in the LSBs. This has a greater impact

on the visual quality of the image and as the value of „k‟ in kth

bit embedding increases,

(i.e., embedding data only on kth

bit position alone) the level of distortion also increases.

35

Fig. 2.6. and Fig. 2.7 both justify, if the depth of alteration is more, then it would

considerably decrease the imperceptibility.

Figure 2.6 Binary representation of a one byte gray pixel

Figure 2.7. (a) Cover image

Figure 2.7. (b-e) Stego images k

th position 8, 7, 6, 5 for 256×256 bits embedding

Figure 2.7. (f-i) Stego images k

th position 4, 3, 2, 1 for 256×256 bits embedding

36

A practical example of embedding the confidential information only on the kth

bit

position from the 1st LSB to the 8

th MSB is illustrated in 2.5. It can be seen that

embedding in the 8th

, 7th

, 6th

, 5th

MSBs and 4th

LSB generate more visual distortion to the

cover image as the hidden information is seen as “non-natural”. Hence it is suggested to

embed data only till the 4th

LSB, and definitely not on the MSBs.

Consider a cover pixel intensity value as “160”. Its binary representation is

10100000. Assume in all the bits of a pixel data has been altered while embedding. Then

for 1st bit alteration would give 161, 2

nd bit alteration would give 162, 3

rd bit alteration

would give 164, 4th

bit alteration would give 168, 5th

bit alteration would give 176, 6th

bit

alteration would give 128, 7th

bit alteration would give 224 and Finally 8th

bit alteration

would give 96. The differences are computed for k = 1 to 8 is as follows 1, 2, 4, 8, 16, -

32, 64 and -68 respectively.

Potdar et al., [121] proposed a spatial domain technique for robustness against

image cropping attacks by splitting the cover-images into segments after which secret is

embedded and then a Lagrange interpolating polynomial along with the encrypting

algorithm is used for data recovery.

Shirali-Shahreza and Shirali-Shahreza [122] exploit the Arabic and the Persian

languages for their numerous alphabets with dots and based on the binary values of the

secret data, the dots are modified. Al-Azawi and Fadhil, [123] proposed a text

steganography technique suitable for Arabic characters, hiding information by inserting

extensions character (Kashida). Huffman coding was employed at its initial phase to

compress text into binary format.

37

Colour palette based steganography [8] involves the modification of the LSBs

based on their positions in the colour palette; but they offer little resistance to

compression and statistical counter attacks[10,124,125,126,127]. BMP, GIF and more

recently JPEG image files are being used for this [129].

Jung and Yoo [129] proposed a method of first downsampling image to half its

size, then up-sampling it using Neighbour Mean Interpolation(NMI) technique and then

embedding data in 2 × 2 non-overlapping blocks of the up-sampled image. Drawbacks

include impossibility of recovering the secret without errors and destruction of the

naturally strong correlation between the adjacent pixels and its similarity to pixel-value

differencing techniques renders it prone to histogram analysis attacks.

Histogram-based data hiding uses lossless data hiding using the difference value

of the adjacent pixels in [130]. These have the advantage of recovering the original cover

image from the stego-image while the embedding capacity is restricted.

Nur Mohammad et al. [131] in their work proposed a transparent and high hiding

capacity algorithm which effectively uses Block Truncation Coding (BTC) by employing

a two level (one-bit) nonparametric quantizer and Human Visual System (HVS) masking

characteristics ensuring high visual quality of stego image. Zanganeh and Ibrahim [132]

have proposed a substitution based technique which involves embedding data into

uncertain and higher LSB layers which allows flexibility to embed a large amount secret

message.

2.2.5. Image steganography in frequency domain

Though LSB embedding in the spatial domain is a good method for deceiving the

HVS, it offers least resistance to attacks, and hence it was exploited for use in the

38

frequency domain. Basically, in these techniques, the Discrete Cosine Transform (DCT)

is first taken and each block DCT coefficient is quantized using a specific Quantization

Table (QT). After quantization, Huffman's algorithm is then used to compress the result

and since most of the redundant data and noise are lost in this stage, this is termed as

lossy compression [25]. A work by Li and Wang [133] modifies the QT and inserts the

hidden bits in the middle frequency coefficients thus increasing the payload.

In the DCT techniques[134], data is inserted into the coefficient‟s insignificant

bits and since the change is made in the frequency domian, there is very less visible

change in the spatial domain. Raja et al., [135] proposed that Fast Fourier Transform

(FFT) methods are not suitable for covert communication as they introduce round-off

errors; whereas Johnson and Jajodia [8] made use of FFT among other transformations

and [136] showed that FFT based steganography was used in movies as well.

The JSteg algorithm employed for the JPEG images is resistant against visual

attacks but leaves a significant statistical signature. Wayner in his dissaperaring

cryptography book [137] states that the hidden information distorts the bell shaped curve

of the DCT coefficients. Also, Manikopoulos et al. in [138] discussed an algorithm which

uses Probability Density Function (PDF) to detect hidden data.

OutGuess uses a pseudo-random-number generator to select DCT coefficients

[10] and the 2 -test doesn‟t detect its presence but an extended version of the same could

outmode this technique as well. Andreas Westfeld‟s “F5” algorithm [19], better known as

syndrome coding makes use of subtraction and matrix encoding and proved robust

against the 2 -test and its extended version but could not resist the steganalysis method

by Fridrich [128] which exploits the natural distribution of DCT coefficients.

39

Perturbed Quantization (PQ) in [139] aims at higher efficiency with minimal

distortion and assigns scalar values as to how much distortion would occur for each

coefficient on embedding and the steganographer can carfefully choose the locations with

least distortion thus leading to high imperceptibility. The main drawback of using DCT is

that embedded data cannot be retrieved if the stego-image is re-compressed.

A good literature on steganography in Discrete Wavelet Transform (DWT)

domain is discussed in detail [40, 140, 141], which is still in its infancy stage. Abdulaziz

and Pang reaffirm that modifying data using a wavelet transformation preserves good

quality with little perceptual artifacts by their methods involving Bose and Ray-

Chaudhuri (BCH) an error correcting code and 1-Stage discrete Haar Wavelet transforms

[142].

Abdelwahab and Hassan proposed a DWT domain steganographic method which

involves taking the DWT of both secret and cover images and then dividing them into 4 ×

4 blocks. Secret image bocks fit into the cover image blocks and the error blocks

generated are embedded into the best matched blocks in the horizontal sub-band of the

cover image [143]. The Inverse Discrete Fourier Transform (IDFT), encompasses round-

off error thus rendering DFT improper for steganography applications.

2.2.6. Adaptive image steganography

Adaptive steganography, also known as “Statistics-Aware Embedding” [10],

“Masking” [8] or “Model-Based” [117] takes statistical global features of the image

before attempting to interact with its LSB/DCT coefficients. Any change is made

according to the statistics [144] and [145] and is characterized by a random adaptive

selection of pixels to avoid areas of uniformly coloured smooth areas.

40

Data embedding in noise [140] has proven to be robust with respect to

compression, cropping and image processing [146, 147, 148]. The model-based method

MB1 [117], generates a stego-image based on a given distribution model using a

generalized Cauchy distribution resulting in minimum distortion but can be detected

using the first-order statistics [149, 150] and also by the difference of „blockiness‟

between a stego-image and its estimated image reliability [151]. Edge embedding is

robust and maintains a good imperceptibility by locating edge segments of locations in a

fixed block fashion with its centre on an edge pixel [152]. Chin-Chen et al. proposed an

LSB substitution method based on the correlation between neighbouring pixels to

estimate the degree of smoothness and the payload is high [153].

“A Block Complexity based Data Embedding” (ABCDE) [154] embeds the noisy

block obtained converting the secret data with selected noisy blocks in the image. The

hidden message is more a part of the image than just the added noise [155] and has a very

high embedding capacity. The chief drawback is that certain control parameters have to

be configured manually rendering it unsuitable for automatic processes. This algorithm

was developed as an improvement over Bit Plane Complexity Segmentation (BPCS),

[156] which compensated the drawback of LSB manipulation techniques.

In a method explained in [155], wavelet transforms are used to map integers to

integers and this overcomes the difficulty of floating point conversion that occurs after

embedding. The payload is embedded in non-overlapping 4 × 4 blocks of lower

frequency choosing two pixels on either side of the diagonal at a time.

In [157], a method to restore the marked image to its original state after data

extraction is proposed and this is done by using the histogram peak-point in the

41

difference image and generating the inverse transformation in the spatial domain. The

selection of the local histogram‟s peak point bp will direct the embedding process and

matrix manipulation. One drawback is that the authors have not given any explanation on

the effect of homogeneous, dark, bright and edged blocks on the algorithm efficiency.

Wu and Shih have proposed a Genetic Algorithm (GA) based method which

generates a stego-image to resist its detection in the spatial and frequency domain

steganalysis systems by artificially counterfeiting the statistical systems and the process

is repeated until some predefined condition is satisfied. It is not stated whether the

predefined condition is generated automatically or has to be declared manually. Their

claim that their paper was the first to use evolutionary algorithms is not true and prior

works include [160]. Yu et al. [151] extends the conventional '1' algorithm to JPEG

images using genetic algorithms.

Kong et al. proposed a content-based image embedding scheme in which a

watershed method coupled with Fuzzy C-Means FCM [161], is used to segment the

homogenous grayscale areas and entropy is calculated for each segment. This entropy

determines the embedding capacity and accordingly either four or two LSBs are

embedded. The sensitivity to intensity changes affects the extraction of the correct secret

data.

Chao et al. proposed a 3D steganography scheme of embedding the secret

messages in the vertices of 3D polygon models [162]. On a similar note, Bogomjakov et

al. hide a message in the indexed representation of a mesh by taking the permutation of

the order in which the faces and the vertices are stored [163]. The difficulties faced

42

include time complexity to generate the mesh and 3D graphics are not easy to port as the

digital images.

Wien Hong et al. proposed a method to improve the stego image quality by using

reversible contrast mapping data hiding scheme that uses the variance feature of the cover

image [164]. Hao Luo et al., proposed a method that incorporates secret sharing and data

hiding technique for block truncation coding for image compression. Under this method,

two quantization levels are hidden in two shared images to increase the level of

compression [165].

Xiang et al. designed a novel steganography method that employed selecting a

series of Multiple Choice Questions (MCQ‟s) that could generate the secret data. This

technique when compared against the existing linguistic steganographic techniques

seemed superior [166]. Luo et al. presented an algorithm based on the directed

Hamiltonian path selection in the complete digraph mapped from multi-blogs [167]. This

work was found to possess good imperceptibility and high security.

An adaptive data hiding based on edge pixels in spatial domain is available in

[168], Chen and chang proposed an Optimal Pixel Adjustment Process (OPAP) to

improve the imperceptibility, but the drawback of this method is that it is not adaptive

[169]. In a method proposed by Yang, author has proposed an inverted pattern (IP) LSB

substitution approach [168], to increase the quality of the stego image. Under this

method, before embedding some of the secret messages are inverted and the others are

left unchanged a simple strategy is used to find whether a section of a message is

inverted and a bit string named IP is used to record the inverting actions. They also use

OPAP to further increase the quality of the stego image. They have also shown promising

43

results as the final image quality obtained was better than optimal LSB substitution

approach [14, 169] and the OPAP LSB substitution approach [171].

2.2.7. Steganography methods - An illustration

For a better understanding of the aforementioned concepts and the succeeding

chapters, this section discusses in detail about LSB, IP, Pixel Value Differencing (PVD)

and Pixel Indicator (PI) methods.

Least Significant Bit data embedding scheme

The main reasons for the LSB Substitution method [169] to be popular are as

follows. Firstly, the ease of computation is very high because of its straight forward

implementation. Secondly, large amount of information or payload can be hidden in the

cover image without distorting it. Human eye is sensitive only to the changes made in the

smooth areas of an image. It overlooks or cannot perceive the alterations made to the less

sensitive edge areas of the image.

But traditional LSB substitution method has the following disadvantages:

Since it is a well known method, the message embedded using this method is

vulnerable.

The number of message bits embedded in each pixel is the same for all the pixels.

Hence the decoding of the embedded is very easy and security of the message is

at stake.

Visual degradation is possible if more number of message bits is embedded in the

edge areas of the image, hence for fully embedded image visual degradation will

be high.

The payload is uniform in all the pixels.

44

This method is not robust. i.e., when subjected to image processing, it will lose

the confidential information.

Optimum Pixel Adjustment Procedure (OPAP)

OPAP reduces the distortion caused by the LSB substitution method [169]. Here

the pixel value is adjusted after the hiding of the secret data is done to improve the

quality of the stego image without disturbing the data hidden.

Procedure for hiding

First a few least significant bits are substituted with the data to be hidden.

Then in the pixel, the bits before the hidden bits are adjusted suitably if necessary

to give less error.

Let n LSBs be substituted in each pixel.

Let d= decimal value of the pixel after the substitution.

d1 = decimal value of last n bits of the pixel.

d2 = decimal value of n bits hidden in that pixel.

• If ((d1~d2)<=(2^n)/2 ) then no adjustment is made in that pixel.

• Else

If(d1<d2)

d = d – 2^n .

If(d1>d2)

d = d + 2^n .

This d is converted to binary and written back to pixel.

Retrieval

The retrieval follows the extraction of the least significant bits (LSB) as hiding is

done using simple LSB substitution.

Advantages

1. Simple methodology.

45

2. Easy retrieval.

3. Improved stego-image quality than LSB substitution.

Inverted Pattern Approach (IP)

This IP LSB substitution approach uses the idea of processing secret messages

prior to embedding [170]. In this method each section of secret images is determined

whether to be inverted or not before it is embedded. In addition, the bits which are used

to record the transformation are treated as secret keys or extra data to be re-embedded.

The embedding procedure

The embedded string is S, the replaced string is R, and the embedded bit string to

divided to P parts.

Let us consider n-bit LSB substitution to be made. Then S and R are of n-bits

length.

For P part in i = 1 to P

If MSE(Si,Ri) ≤ MSE(S’i,Ri)

Choose Si for embedding

Mark key(i) as logic „0‟

If MSE(Si,Ri) ≥ MSE( S‟i,Ri)

Choose S‟ i for embedding

Mark key(i) as logic „1‟

MSE – Mean Square Error.

End

where, S is the data to be hidden

S‟ is the data to be hidden in inverted form.

Procedure for retrieval

The stego-image and the key file are required at the retrieval side.

First corresponding numbers of LSB bits are retrieved from the stego-image.

46

If the key is „0‟, then the retrieved bits are kept as such.

Else if the key is „1‟, then the bits are inverted.

The bits retrieved in this manner from every pixel of the stego-image give the data

hidden.

Pixel Value Differencing (PVD) methods

HVS approach is applied to embed data, for example, Wu and Tsai have used this

technique in their paper [111], in which they have applied HVD and determined that

more data could be embedded into the edge areas rather than into the smooth portions of

the image. The side match approach used by Chang and Tseng is also worth a mention as

they have used the difference between the side pixels to find the embedding capacity

[147]. Lee and Chen also proposed a method in which they have used the contrast and

luminance of the neighbor-hood pixels [172]. They have also introduced an additional

concept in which the greater a grayscale is, the more change of the grayscale could be

tolerated. This was also utilised by Wang [173]. PVD is able to provide a high-quality

stego image in spite of the high capacity of the concealed information [80, 111, 147, 172,

173]. That is, the number of insertion bits is dependent on whether the pixel is in an edge

area or smooth area. In edge area, the difference between the adjacent pixels is more,

whereas in the smooth area it is less as human perception is less sensitive to subtle

changes in edge areas of a pixel.

PVD – An illustration [80]

This method hides the data in the target pixel by finding the characteristics of four

pixels surrounding it, as indicated in the Table 2.5 below.

47

Table 2.5 Pixel arrangement in spatial domain

g(x-1,y-1)

top left pixel

g(x-1,y)

top pixel

g(x-1,y+1)

top right pixel

g(x,y-1)

left pixel

g(x,y)

target pixel

g(x-1,y-1) , g(x-1,y) , g(x-1,y+1) , g(x,y-1) are the gray values of the pixels surrounding

the target pixel g(x,y).

Embedding procedure

Select the maximum and the minimum values among the four pixel values that

have already finished the embedding process. Calculate the difference value d

between the maximum pixel value and the minimum pixel value using the

following formula

“ d = gmax − gmin “

where,

gmax = max(g(x−1,y−1), g(x−1,y) ,g(x−1,y+1), g(x,y−1)) and

gmin = min(g(x−1,y−1), g(x−1,y) ,g(x−1,y+1), g(x,y−1))

Use above equations to judge, whether the target pixel is included in an edge area

or a smooth area. The number of bit n inserted into the target pixel, is determined

by value d.

Calculate n = log2d -1 , if d > 3.

= 1 otherwise.

Calculate a temporary value tx,y = b − (gx,y mod 2n)

where b is the data to be hidden.

Calculate t1

=t(x,y)

if (-(2 n -1)/2)≤t(x,y)≤(2 n -1)/2 n

=t(x,y)+2 n

if(-2 n +1) ≤ t(x,y) < (-2 n -1)/2 n

=t(x,y)-2 n

if(2 n -1)/2 < t(x,y) < 2 n

g1(x,y)=g(x,y)+t1(x,y).

g1(x,y) is the new pixel value.

48

Retrieval

n is calculated in the same way as in the sender side.

The target pixel value is present in g(x,y).

The data hidden is b=g1(x,y) mod 2n.

Pixel Indicator (PI) Method

Gutub proposed PI method [174] and implemented for random image

steganography. One channel is fixed as an indicator and the specified amount of bits by

user (say k bits, for example 2 bits) are then embedded in the other two channels

depending upon the last two bits of the indicator channel, and the details are given in

Table 2.6.

Table. 2.6 Meaning of indicator values

Thus if „RED‟ plane is selected as an indicator, and its last two bits be „11‟ then k-

bits (as defined by user) of data are embedded in the blue and the green channel

respectively. Variable payload for the chosen cover is the specialty of this method, where

the last two bits of the indicator decide the embedding capacity.

In the following section, transform domain methods like, a simple DCT [4] and

Integer Wavelet Transform method (IWT) [175] have been discussed.

INDICATOR CHANNEL 1 CHANNEL 2

00 No data embedded No data embedded

01 No data embedded k bits of data embedded

10 k bits of data embedded No data embedded

11 k bits of data embedded k bits of data embedded

49

DCT based embedding

In this transform domain technique; DCT is used to hide messages in significant

areas of the cover image. Here pixels are split into 8 × 8 blocks. Then, all blocks are DCT

transformed and each block encoding exactly one secret message bit.

Procedure for hiding

The embedding process starts with selecting a block Bi which will be used to code

the ith

message bit.

Let Bi = D{bi} be the DCT-transformed image block.

Before the communication starts, both sender and receiver have to agree on the

location of two DCT coefficients, which will be used in the embedding process.

Let us denote these two indices by (u1, v1) and (u2, v2).

Let m(i) be the ith

message bit.

If m(i)=0 ,

if Bi(u1, v1) > Bi(u2, v2) then

swap Bi(u1, v1) and Bi(u2, v2)

else if m(i)=1,

if Bi(u1, v1) < Bi(u2, v2) then

swap Bi(u1, v1) and Bi(u2, v2)

The last step is to take inverse dct of the blocks to obtain the stego image.

During the retrieval, again the stego image is split as 8×8 pixel blocks and is DCT

transformed.

Now, the predetermined set of two DCT coefficients are compared for all the

blocks.

if Bi(u1, v1) > Bi(u2, v2) then the message bit=1,

else 0.

Procedure for Retrieval

A block Bi is selected in the stego-image.

Then the dct is performed on the block, Bi=D{bi}.

50

Then the two indices (u1,v1) and (u2,v2) which are chosen by both sender and

receiver are compared.

If Bi(u1, v1) > Bi(u2, v2)

Then data hidden=‟1‟

Else if Bi(u1, v1) > Bi(u2, v2)

Then data hidden=‟0‟

This procedure is repeated for all the blocks in the image.

Advantages

This method is more robust to attacks, such as compression, cropping etc.

Though the embedding capacity is low, the quality of image is good.

IWT based embedding

Step 1: Read the cover image as a 2D file with size of 256×256 pixels.

Step 2: R, G and B planes are separated

Step 3: Consider a secret data as text file. Here each character will take 8 bits.

Step 4: Histogram modification is done in all planes, Because, the secret data is to be

embedded in all the planes, while embedding integer wavelet coefficients produce stego-

image pixel values greater than 255 or lesser than 0. So all the pixel values will be ranged

from 15 to 240.

Step 5 : Each plane is divided into 8×8 blocks

Step 6: Apply Haar Integer wavelet transform to 8 × 8 blocks of all the planes, This

process results in LL1, LH1, HL1 and HH1 sub bands

Step 7: Using Key-1(K1) calculate the Bit length (L) for corresponding wavelet co-

efficients (C0),

40,

2

221

222

2,3

1

0

2

0

1

3

0

2

3

0

k

Cifk

Cifk

Cifk

Cifk

L

k

kk

kk

k

51

Step 8: Using key-2 select the position and coefficients for embedding the „L‟ length data

using LSB substitution [159]. Here data is embedded only in LH1,HL1and HH1 sub-

bands. Data is not embedded in LL1 because they are highly sensitive and also to

maintain good visual quality after embedding data.

Step 8: Applying Optimal Pixel adjustment Procedure (OPAP) reduces the error caused

by the LSB substitution method [159].

Step 9: Take inverse wavelet transform to each 8×8 block and combine R,G&B plane to

produce stego image.

Extraction algorithm

Step 1: Read the Stego image as a 2D file with size of 256 × 256 pixels.

Step 2: R, G and B planes are separated

Step 3: Each plane is divided into 8 × 8 blocks

Step 4: Apply Haar Integer wavelet transform to 8×8 blocks of all the planes, This

process results LL1,LH1,HL1 and HH1 sub-bands.

Step 5: Using Key-1 calculate the Bit length (L) for corresponding wavelet co-

efficients(WC), using the „BL‟ equation used in Embedding procedure.

Step 6: Using key-2 select the position and coefficients for extracting the „BL‟ length

data.

Step 7: Combine all the bits and divide it in to 8 bits to get the text message.

To summarize, this review suggest the following, that a simple classification

could be methods based on spatial or transform domain techniques. In addition, there is a

possibility to classify steganography methods based on the covers i.e., Video

Steganography, Text based Steganography, Audio Steganography and Image

Steganography [5]. The former method could be further classified into substitution,

transform, statistical, spread spectrum and cover generation methods [2]. Another

classification on steganography is pure steganography, secret key steganography and

52

public key steganography [2]. The comparative performance on the aforementioned

methods is given in Table 2.7 and the cover and stego images are given in Fig 2.8 (a-n).

In addition this survey suggests a classification based on imperceptibility, capacity and

robustness for random image steganography is available in Fig 2.9.

53

Table 2.7 The comparison on the aforementioned methods follows:

Methods Domain Imperceptibility Capacity Robustness Complexity/

Security

Adaptive Embedding

Simple

LSB

Spatial Fair till k = 3 bit k bits/Pixel Low Low Constant k bits/Pixel

OPAP Spatial Good even for k = 4 bit k bits/Pixel Low Low Constant k bits/Pixel

IP Spatial Best even for k = 4 bit k bits/Pixel Low Good Constant k bits/Pixel

PVD Spatial Good Lesser than k bits/Pixel Low Good Adaptive k bits/Pixel

DCT Transform Fair Low Medium Excellent Depends on cover & method

IWT Transform Best Moderate High Excellent Adaptive

Figure 2.8.Selected cover images 256 × 256 (a) Lena, (b) Baboon

Figure 2.8.(c-h) Stego Images Lena (c) simple LSB, (d) OPAP, (e) PVD, (f) IP, (g) DCT, (h) IWT

Figure. 2.8.(i-n) Stego Images Baboon (i)simple LSB, (j) OPAP, (k) PVD, (l) IP, (m) DCT. (n) IWT

54

Random Image Steganography

Spatial Domain Methods Frequency Domain Methods

Imperceptibility

Capacity

Robustness

Adaptive Random Image Steganography

Randomness through Preprocessing Randomness while Embedding

Figure. 2.9. Classification on random image steganography

55

2.2.8. Pseudo random permutation steganography

A little too deceiving method for the sender, this incorporates the complete

utilization of the cover image, such that every bit is not left turned. This method of

embedding data along with the secret key in a random fashion leaves the hacker with no

hint. Hence, these methods are extremely tedious to poach into the data.

This random fashion of encoding can be done with multiple keys( k1, k2, k3 and so on)

or by the creation of multiple element indices from (J1………Jm).

2.2.9. Recent trends suggested in random image steganography

Random image steganography is defined as an image steganography which offers

cryptic effect. So far literature expects and suggests that well defined cryptography

algorithms could be employed prior to embedding of the confidential information to offer

cryptic effect. But random image steganography is to preprocess the data, followed by

encryption with well defined cryptographic algorithms then adapt any one of the possible

ways to improve the complexity.

Possible ways of random image steganography

Method 1: K bit embedding with a key 1 [0 0 0 0 1 1 0 1] in a pixel

Method 2: Key 2 [1 0 1 0 1 1 0 1] in a cover

Method 3: Using Fibonacci series 1, 2, 3, 5, 8, 13 …. If exceeds use mod

length of the Cover, problem collision attacks.

Method 4: Variable bit embedding on the pixel (PVD)

Method 5: Encrypt the secret then embed

Else Better Change the “ROUTE” for embedding...

56

Method 1: k - bit embedding with a key 1 [0 0 0 0 1 1 0 1] in a pixel

It will embed data into the pixels based on the four LSBs of the key.

1) If key= [0 0 0 0 1 1 0 1] then embedding should be in the 1st(2^0),3

rd(2^2) and 4

th(2^3)

LSBs

2) If key= [0 0 0 0 0 1 0 1] then embedding should be in the 1st(2^0) and 3

rd(2^2) LSBs

Merits: Its embedding capacity, MSE and PSNR depends on the key. Randomness

is introduced in this method if the keys are other than [0 0 0 0 0 0 0 1], [0 0 0 0 0 0 1 1],

[0 0 0 0 0 1 1 1], [0 0 0 0 1 1 1 1], as in these cases it will be normal LSB substitution

with 1,2,3,4 bits respectively.

Complexity: If the data is encrypted using DES it will introduce a complexity of (2^64)

Probability of embedding 0-bits in last four LSBs is ((4c3)/16) = (1/16)

Probability of embedding 1-bit in last four LSBs is ((4c1)/16) = (4/16)

Probability of embedding 2-bits in last four LSBs is ((4c2)/16) = (6/16)

Probability of embedding 3-bits in last four LSBs is ((4c3)/16) = (4/16)

Probability of embedding 4-bits in last four LSBs is ((4c4)/16) = (1/16)

So the final complexity of embedding 1-bit is: (2^64)*(1/16)*(1+4+6+4)

To improve complexity: Good when keys [0 0 0 0 0 0 0 1], [0 0 0 0 0 0 1 1], [0 0 0 0 0 1

1 1] and [0 0 0 0 1 1 1 1] are not used.

Imperceptibility: Visible to some extent if the key used is [0 0 0 0 1 1 1 1].

Suggestion: Do not embed more than 3 bits in gray and 8 bits in color image.

Method 2: Key 2 [1 0 1 0 1 1 0 1] in a cover

It will embed data into the selected pixels basing on the key.

57

Example: 1) If key= [1 0 1 0 1 1 0 1] then embedding should be done in the

pixels 1, 3, 5, 6, 8. This sequence of embedding should be repeated for a block of eight

pixels for complete embedding.

2) If key= [1 1 0 0 0 1 1 1] then embedding should be done in the

pixels 1, 2, 6, 7, 8. This sequence of embedding should be repeated for a block of eight

pixels for complete embedding.

Merits: It has a relatively lower MSE and a relatively higher PSNR. Randomness is

introduced in this method if the key is other than [1 1 1 1 1 1 1 1] as in this case it is

normal raster scan LSB substitution with zero randomness.

Complexity: If the data is encrypted using DES it will introduce a complexity of (2^64)

To improve complexity: good when key [1 1 1 1 1 1 1 1] is not used.

Imperceptibility: visible to some extent if key [1 1 1 1 1 1 1 1] is used with 4-bit

embedding in each pixel.

Method 3: Using Fibonacci series 1, 2, 3, 5, 8, 13 …. If the value exceeds, then use

the mod length of the cover. The problem with this is collision attacks.

In this method pixels are selected for embedding in the following way. A row is

selected if it is not a Fibonacci number. Similarly, the column is also selected. Two

methods are possible. In the first methodology, embedding can be done in all the row and

column numbers that are a part of Fibonacci series. In the second methodology,

embedding can be done in all the row and column numbers that are not a part of

Fibonacci series.

58

Example: In method 1 rows 1,2,3,5,8,… are selected and in a particular row again pixels

1,2,3,5,8,… will be selected for embedding.

In method 2 rows 1,2,3,5,8,… are selected and in a particular row again pixels

1,2,3,5,8,… will not be selected for embedding. All others pixels will be selected for

embedding.

Merits: Method 1 gives more randomness and imperceptibility while method 2 gives

more embedding capacity.

Complexity Analysis: If the data is encrypted using DES it will introduce a complexity

of (2^64)

For method 1: (for a 256*256 image, the complexity varies with respect to size of

image)

Selecting a row which is a part of Fibonacci series can be done in (12/256) ways.

Selecting a column which is a part of Fibonacci series can be done in (12/256) ways.

4 bits can be selected for embedding in four LSBs in 1 way.

So the final complexity of embedding 1-bit is: (2^64)*(256/12)*(256/12)*1

For method 2: (for a 256*256 image, the Complexity varies with respect to size of

image)

Selecting a row which is not a part of Fibonacci series can be done in (244/256) ways.

Selecting a column which is not a part of Fibonacci series can be done in (244/256) ways.

4 bits can be selected for embedding in four LSBs in 1 way.

So the final complexity of embedding 1-bit is: (2^64)*(256/244)*(256/244)*1

59

Method 4: Variable bit embedding on the pixel (PVD)

This method is similar to embedding data into pixels based on the nature of

image. If the image is having an edge, more bits will be embedded and if it‟s a smooth

area then less bits are embedded.

Merits:

Since it is taking the image texture into consideration, the imperceptibility is very high. It

is also complex due to the variable bit embedding.

Complexity analysis:

If the data is encrypted using DES it will introduce a complexity of (2^64)

It is taking variable bit embedding and hence the complexity increases.

Imperceptibility: is low because it takes the image texture into consideration.

Method 5: Encrypt the secret then embed

Here simply the data is first encrypted using some encryption algorithm, and then

encryption is done with the encrypted data and not with the original data. Security

increases because of encryption but it will also depend on the embedding algorithm. It

can be combined with any of the methods above.

2.3. A REVIEW ON STEGANALYSIS

Steganalysis in a nutshell, tests the strength of a stego system. However,

technically, it aims at detecting the presence of secret messages [176]. Deriving its roots

from cryptanalysis, since its origin it has been at a constant war with its rival in principle,

steganography. These systems usually encompass various image processing techniques

such as cropping, filtering, resizing etc., or are designed to deduce presence of any stego

system by computing its statistical properties eg. Histograms, correlations, chi square etc.

60

steganalysts use two kinds of analysis namely Passive and Active. Passive steganalysis

does not preserve the payload. It merely distorts or corrupts the secret information present

in the cover defeating the aim of safe transmission of hidden messages. Whereas, active

steganalysis aims to detect the exact algorithm that is employed in hiding the data and

extracts the payload rather than destroying it.

The methods that these systems follow can be broadly classified under

Steganalysis for specific embedding and Universal blind steganalysis [45, 93, 103, 177].

Specific steganalysis is used to efficiently determine the secret data and the bit

embedding ratio. Steganalysis in particular has been found to be primarily effective

against spatial steganography. It has been able to detect any trace of unusual noise,

relations between indexed colours and patterns between colour pallets. The method is

pretty fragile though [178].

LSB shows weak resistance to filtering, compression, distortion, scaling rotation,

cropping, addition of noise, or lossy compression and hence is completely vulnerable to

any kind of passive analysis. In fact, the entire message can be destroyed by removing the

entire LSB plane causing minimal perceivable difference [124]. Algorithms like RS,

SPA, DIH and LSM can detect the spatial LSB steganography reliably.

Fridrich et al. [179] was able to extract messages embedded in LSB with

embedding capacities as small as 0.03 bpp, by understanding the inner structure of

LSB‟s[179]. Kong et al. pointed out that “pair effect” takes place in LSB substitution

which can be observed from its histogram particularly in cases which use modulus

operator [127].

61

Chi square (χ2) and pair analysis algorithms are very effective on the spatial

domain. Chi square is a non-parametric statistical characteristic of an image that accounts

for the confidence of data present to be uncorrupted and random. This particular

characteristic can determine whether the image intensities follow any distributed pattern

or random pattern. If the intensity levels pertaining to a specific distributed pattern are

identified, then any pixels that belong to these intensity level can be reliably marked as

corrupted or pixels with high probability of data embedding. However, a simple way to

beat this algorithm would be by embedding random chunks of data distributed in a

pseudo random fashion, destroying the true significance of chi square data received from

the altered image. Bohne et al. developed a method to detect randomly scattered data in

LSB domain which made use of Preserving Statistical Properties (PSP) algorithm [150].

The above equation can be used to compute the chi square static, where is the

observed pixel value and is the expected pixel value for the ith

pixel. Jessica et al .[181]

presented a statistical method which operated using a higher order statistics called RS

statistics which provides a rough estimate of pixels flipped pixels caused by embedding.

Li et al. [182] exploited the weakness of YASS algorithm [118], observing the

extra zero coefficients in the embedded host blocks because of the use of a quantization

index modulation (QIM) and the contrasting statistical features derived from stego image

blocks

However, specific embedding steganalysis practicality remains widely

questioned, since analysers would actually find it difficult to zero down to a particular

62

embedding pattern. The embedding method being a steganographers choice would be

difficult to be determined. Hence a more practical way of steganalysis is approached,

namely universal blind steganalysis [177]. In this approach, primary importance is paid to

the flexibility or the adaptability of the method to improvise and train itself, accustoming

itself to the rather unknown stego system. It is a meta detection system in the sense that it

can be adjusted, after training on cover and stego images, to detect any steganographic

method regardless of the embedding domain.

The universal blind steganalysis has been given keen focus of attention in recent

times. These methods can further be broadly classified into two groups. One wherein

cover and stego images are detected using the original images and employ training set

and extraction features to detect the embedded data. Since this particular category of

methods remains in dark about the methods employed in embedding, they are labelled as

blind steganalysis methods. Jessica et al. [183] designed a steganalysis system for the

frequency domain which comprised of DCT features and calibrated Markov features.

The other classification widely deals with the training set employing various

steganography methods on the original image and comparing the resultant images against

the stego object. Analysers in this method have rounded about the suspicion to few

specific methods but remain unsure of the method that has been particularly used on the

object. These methods are hence known as half blind methods. It is worth mentioning

since these methods are based on developments in certain generalized methods, they can

be used to detect and develop new steganography methods.

Of late, trained classifiers are being developed to detect secret messages. Avcibas

et al. proposed the framework for classifier based steganalysis using image quality

63

metrics [184, 185]. Farid also went ahead to investigate the problem faced by classifier

based steganalysis and supported that classifier scheme was effective to deal with the

variable image statistics and algorithms of unknown stego systems [45, 186].

Researches also point out that a single steganalysis system is usually incapable of

detecting the data by itself and strengthening the system would actually imply increasing

the number of features present in the system. Liu et al works consisting of a few single

feature steganalysis system went ahead to validate the same [187]. Avcibas et al used ten

image quality metrics as feature set and employed 18 features from binary similarity

measures of the seventh and eighth bit planes in an image for classification [184].

Similarly Fridrich et al. went ahead and extracted 23 calibrated features from DCT and

spatial domain [188]. These works helped in subsequently converging into a universal

classifier which exploited 81 features extracted from the higher-order absolute moments

of residual noise in the wavelet domain. In the light of more recent developments, Chen

et al. adapted 324 features from the statistical moments of wavelet characteristic

functions [189].

However, oversizing the steganalysis method with more features could adversely

affect its performance. Hence, the concept of feature selection was brought to light

wherein selection of optimised features helped to improve the features of the systems yet

deal with a variety of stego methods. Feature selection ruled out redundant features

limiting it to features that could help steganalysts observe the least of sensitivities and

subsequently aid in attacking the system strengthening the entire model.

64

2.4. SUMMARY

In this chapter, a brief encyclopedia of infant steganography to matured

steganography has been presented. Starting with the definition, differences with other

security guards like cryptography and watermarking have been highlighted. In addition

this chapter also discusses the major steganographic algorithms used for digital imaging.

The emerging techniques like DCT, DWT, IWT and Adaptive Steganography alter

coefficients in the transform domain, thus keeping the image distortion at a minimum

level. This property makes them less prone to attacks with the drawback of lesser payload

in comparison with the spatial domain algorithms (LSB, Modified LSB, PVD), further

highlighting the point of tradeoff between robustness and payload. Methods like

compression or correlated steganography which are based on the conditional entropy of

the message given the cover can be used to reduce the number of bits required to encode

the hidden message.

Scholars have contradicting views regarding the importance of robustness for the

steganographic system design. While Cox felt that watermarking would be differentiated

from steganography mainly with the high robustness characteristic of watermarking

[190], Katzenbeisser dedicated a sub-section to robust steganography mentioning

robustness to be a practical requirement for a steganographic system. “Many

steganography systems are designed to be robust against a specific class of mapping.” [2]

Both of their views are based upon their personal experience in the field and opinions. In

general, if somebody suspects a covert communication, then the goal of steganography is

defeated. Hence, robustness is needed for watermarking, but definitely not for

steganography.

65

This Chapter offered some guidelines and recommendations on the design of

possible ways of random image steganography, which is the major motivation of this

review and the same has been enumerated and enunciated with practical examples. As a

finishing touch to the steganography, the significance of steganalysis has also been

highlighted.


Recommended