Designing a combinatorial Image Steganography algorithm based on game theory

Document Type : Original Article

Author

Department of Basic Science, Imam Khamenei Complex University, Imam Hossain University, Gilan, Iran

Abstract

Adaptive steganography methods using an adaptive criterion, sequentially or randomly, hide a message in an image. The aim of security is to reduce the probability of detecting the existence of a message. In this article, first by using game theory it is illustrated that adaptive steganography algorithms with a simulation along with a quasi-random process, named as combinatorial image steganography algorithms have higher security compared to the pure adaptive steganography algorithms. Then, this matter is shown practically by designing patterns based on entropy and the  operator for 5000 natural images. The comparison of two designed algorithms, using SRM which is one of the most famous steganography algorithms, shows about 1.5% security superiority of the combinatory method compared to the purely adaptive method.

Keywords


[1]                 I. Cox, M. Miller, J. Bloom, J. Fridrich, and T.Kalker, “Digital Watermarking and Steganography,” Second edn. Morgan Kaufmann, Burlington, 2007.##
[2]                 R. Bohem, “Advanced Statistical Steganalysis,” Springer-Verlag Berlin Heidelberg, 2010.##
[3]                 F. Cayre and P. Bas, “Kerckhoffs–based embedding security classes for WOA data hiding,” IEEE Transactions on Information Forensics and Security 3, pp. 1–15, 2008.##
[4]                 D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixelvalue Differencing,” Pattern Recognition Letters, vol. 24, pp. 1613–1626, 2003.##
[5]                 X. Zhang and S.Wang, “Vulnerability of       Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recogn. Lett., vol. 25, no. 3, pp. 331–339, 2004.##
[6]                 C-H. Yang, C-Y. Weng, S-J. Wang, and H-M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, 2008.##
[7]                 L. Bin, He. Junhui, H. Jiwu, and Q. S. Yun, “A Survey on Image Steganography and Steganalysis,” Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 2073-4212, 2011.##
[8]                 J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.##
[9]                 W. Luo, F. Huang, and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp.    201–214, 2010.##
[10]              F. Huang, Y. Zhong, and J.Huang, “Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching   Revisited Algorithm,” Springer-Verlag Berlin Heidelberg, pp. 19–31, 2014.##
[11]              H. Al-Dmour and A. Al-Ani, “A Steganography Embedding Method Based on Edge Identification and XOR Coding,” Elsevier, Sience direct, vol. 46, pp. 293-306, 2016.##
[12]              M. Ettinger, “Steganalysis and game equilibria,” In Aucsmith, D., ed.: Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 319– 328, 1998.##
[13]              S. Pascal, L. Aron, J. Benjamin, G. Jens, and B. Rainer, “A game-theoretic analysis of content-adaptive steganography with independent embedding,” In  EUSIPCO. IEEE, 2013.##
[14]              S. Pascal and B. Rainer, “A game-theoretic approach to content-adaptive steganography,” In: Ghosal, D., Kirchner, M. (eds.) Information Hiding. LNCS, 2012.##
[15]              J. Benjamin, S. Pascal, and B. Rainer, “ Where to hide the bits?,” In GameSec, vol. 7638 of LNCS, pp.  1–17, 2012.##
[16]               T.  Mekala and N. Mahendran, “Improved Security in Adaptive Steganography Using Game Theory,” vol.118, no. 8, pp. 111-116, 2018.##
[17]              T. Pun, “A new method for gray-level picture thresholding  using the entropy of the histogram,” Signal Processing, vol. 2, pp. 223-237, 1980.##
[18] GU. Guanghua, Yao Zhao, and Zhu Zhenfeng, “Integrated Image Representation Based Natural Scene Classification,” Elsevier, Expert Systems with   Applications, vol. 38, pp. 11273–11279, 2011.##
[19]   M. A. Shamalizadeh Baei, & et.al., “Designing an Image Steganography Algorithm Based on Entropy and ELSB2,” Advanced Defence Sci. & Tech., vol. 2, pp.       39-50, 2018. (In Persian)##
  • Receive Date: 30 December 2018
  • Revise Date: 15 September 2019
  • Accept Date: 15 September 2019
  • Publish Date: 21 May 2020