Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction

Document Type : Original Article

Authors

1 sattary shahid university

2 azad shahrood

Abstract

Abstract: In all of the image steganography algorithms, the embed capacity and resistance are            considered. Hence, in this paper a new method is proposed that not only has high capacity for embed, but also has high resistance against steg analysis methods. This method presents an initiative to collate the   confidential secret message with a matrix called K, thus large amount of information does not need to be transferred across the channel which effects security, resistance and embed capacity. After classification and mapping, the amount of information that is needed to be sent, changes to numbers between -7 and 7. Hence, by reducing the secret bits needed to send, the changes in the cover are also reduced and the result are     optimized. B y comparing PSNR and SSIM  for this method with other methods in this area, we clearly see improvements in these parameters. The average of PSNR and SSIM is 44.36 and 0.97, respectively both of which are in the perfect range. The average of  numerical value of insertion is 5.99 bits per pixel, which  provides a very high capacity for insertion.
 

Keywords


   [1]      H. J. Highland, “Data encryption: A non-mathematical approach,” Comput. Secur., 1997.##
   [2]      R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Sel. Areas Commun., 1998.##
   [3]      F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hidinga survey,” Issue prot. multimedia content, 1998.##
   [4]      D. W. Bender, N. M. Gruhl, and A. Lu, “Techniques for data hiding,” IBM syst. J., 1998.##
   [5]      H. Wang and S. Wang, “Cyber warfare Steganography vs. Steganalysis,” commun. ACM., 1998.##
   [6]      R. O. Eason and E. Kawaguchi, “Principle and applications of bpcs,” Steganography In proceedings of SPIE, 1998.##
   [7]      I.C. Lin, Y. B. Lin, and C. M. Wang, “Hiding data in spatial domain images with distortion tolerance,” Comput. Stand. Inter., 2003.##
    [8]      C. K. Chan and L. M. Chen, “Hiding data in images by simple LSB substitution,” Pattern recognit., 2004.##
   [9]      D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern recognit. Lett., 2004.##
[10]      C. C. Chang and H. W. Tseng, “A steganographic method for digital images using side match,” Pattern recognit. Lett., 2004.##
[11]      H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Proc. Inst. Elect. Eng., Vis. Images signal process, 2005.##
[12]      Y. R. Park, H. H. Kang, S. U. Shin, and K. R. Kwon, “A steganographic scheme in digital images using information of neighboring pixels,” vol. 3612, Springer-verlag,Berlin, Germany, 2005.##
[13]      C. H. Yang and C. Y. Weng, “A steganographic method for digital images by multi-pixel differencing,” Proceedings of international computer symposium, Taipei, 2006.##
[14]      K. H. Jung, K. J. Ha, and K. Y. Yoo, “Image data hiding method based on multi-pixel differencing and LSB substitution methods,” International conference on convergence and hybrid information technology, 2008.##
[15]      C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganography method with pixel-value differencing and modulus function,” J. Syst. Softw., 2008.##
[16]      C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Secur. 2008.##
[17]      X. Liaoa, Q.-Y. Wen, and J. Zhang, “A steganographic method for digital images with four-pixel differencing and modified LSB substitution,” ELSEVIER, 2011.##
[18]      M. Sabokdast and M. Mohammadi, “A steganographic method for images with modulus function and modified LSB replacement based on PVD,” 5th Conference on information and knowledge technology, IEEE, 2013.##
[19]      C.-H. Yang, C.-Y .Weng, and S.-J. Wang, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Ttransations on information forensics and security, 2008.##
[20]      B. Kaur, A. Kaur, and J. Singh, “Steganography approach for hiding image in DCT domain,” International journal of Advances in engineering & technology, 2011.##
[21]      X. Song, S. Wang, and X. Niu, “An integer DCT and affine transformation based image steganography method,” Eighth international conference on intelligent information hiding and multimedia signal processing, 2012.##
[22]      Tamanna and A. Sethi, “Steganography a juxtaposition between LSB DCT, DWT,” International journal of computer applications, 2015.##
 
[23]      A. Goswami and S. Khandelwal, “Coloured and gray scale image steganography using block level DWT, DCT transformation,” International journal of computer applications, 2016.##
[24]      A. Nourazar, Z. Noroozi, and M. Mir, “An Optimal Method for Images Steganography Based on Linear Codes Features,” Journal of Electronical& Cyber Defence, 2017. (in Persian)##
[25]      G. Swain, “Very high capacity image steganography        technique using quotient value differencing and LSB  substitution,” Arabian journal for science and engineering, 2018.##