Published at : 29 Jul 2019
Volume : IJtech
Vol 10, No 4 (2019)
DOI : https://doi.org/10.14716/ijtech.v10i4.653
Mohammed Abbas Fadhil Al-Husainy | Middle East University, Faculty of Information Technology, Department of Computer Science, Amman, 11831 Jordan |
Diaa Mohammed Uliyan | University of Hail, Faculty of Computer Science & Engineering, Department of Computer Science, Hail, Kingdom of Saudi Arabia |
With
the wide range use of digital communication technologies, the Internet has been
commonly used as a channel for transmitting various images. Steganography practises
have been implemented for achieving such secure transmission. The main focus of
steganography is data hiding where, digital images are utilized as the cover
image. One of the image steganography techniques is based on LSB method, where
the secret message bits are embedded sequentially in LSB of the bytes of the
carrier image. This makes the hidden message vulnerable to detection by
attackers. Many secret key image steganography techniques have been developed
as alternative techniques to achieve a high level of security for the hidden
secret message. But, these techniques failed to use the full capacity of the
carrier image. In this paper, a secret key image steganography technique has
been implemented using chains of a random sequence of indices (codes) of the
bytes in the carrier image. These chains have been constructed based on the
secret key used. This makes the hidden message more secure and difficult to
depict by attackers. Furthermore, the proposed technique uses the full capacity
of the carrier image. Visual and numerical tests have been conducted for the
performance of the proposed technique, the recorded results proved it can be
used effectively in the field of information hiding.
Chains of pixels; Hiding capacity; Image steganography; Information hiding; Information security; Secret key
Information security
has become an important challenge in data networks via Internet. Steganography
and cryptography are employed to achieve the confidentiality of common data
such as text, images and videos. Steganography is regarded to be the best
method to secure an image because the hidden message is not perceptible for
inspection by unauthorized access. Steganography plays the central role in
secret message communication (Al-Husainy & Uliyan 2017).
The scenario of steganography starts by selecting an appropriate message carrier before hiding process, an image is considered as a good carrier to embed secret message. An effective message to be hidden as well as a stego key between sender and receiver shared as a secret stego key. Carrier image is defined as the object, where the message is hidden. Various types of files have been selected to hide messages. For instance, images, video, audio and text documents (Pal & Pramanik, 2013).
Secret image represents the image to be embedded in the carrier image, and stego image represents the image that holding the hidden message. The main goal of steganography is to make a stego image, which carries the secret messages. A secret stego keyis defined as password, which is an additional secret information required to protect the hidden secret image (Prasad & Pal, 2017).
Recently,
images are commonly used as a carrier to hide information. According to type
embedding information in the image content, steganography methods can be
categorized into: spatial domain techniques (Gul & Kurugollu, 2010) and
frequency domain techniques. While, the spatial domain techniques apply direct
manipulation over pixels of the image, the transform domain techniques
transform the image into the frequency domain and then hide the secret message.
It is important to notice that the hiding capacity of secret messages in
spatial domain technique is relatively larger than frequency domain techniques.
Steganography
techniques which use stego key for hiding information are classified into three
classes (Sumathi et al., 2014): pure steganography, secret key steganography,
public key steganography.
A
large number of images transmitted via the Internet have encouraged researchers
to use these images as a cover media in developing the steganography methods
for protecting data in the field of information security. Image steganography
methods concentrate on the techniques of hiding a secret data in a cover image
and generate a stego image which is carrying a hidden secret message (Kaur et
al., 2014). An image steganography model
consists of three elements: secret data, cover image, and key. Hence, stego
image is the cover image contains the secret data and stego key is the key used
to embed the secret data in the cover image (Subhedar & Mankar, 2014).
The
success of the image steganography methods depends on exploiting the weak point
of detecting minor changes happened in the stego-image pixels. These changes
made by the human visual system (HVS). There are some major properties that
determine the strength and weaknesses of the image steganography techniques
(Purohit & Sridhar, 2014): capacity, robustness, undetectability.
These
goals are hard to achieve at the same time. Hiding long message makes it more
vulnerable to detect by attackers, (i.e. It becomes less secure) and vice
versa. One of the common techniques to do steganography is hiding secret
messages in the least significant bit (LSB) of the image plane. LSB techniques
in terms of the competing major properties are considered as a practical way to
conceal messages in the spatial domain of the image plane. Furthermore, it can
hide large quantities of data, for instance, high payload capacity (Hamid et
al., 2012).
Least
significant bit (LSB) is the traditional method of embedding secret information
in a digital image (Yadav et al., 2014), (Uliyan & Al-Husainy, 2017). The
traditional method uses the LSB of the pixels in the cover image to hide the
bits of the secret message. This usually causes distortion in the stego image
and the ratio of distortion depends mainly on the number of changes that occur
in the LSB of pixels. This distortion must keep at the minimum to drive away
any doubt about the presence of the secret message in the stego image.
In the
field of information security, many researchers focused on innovation of strong
steganography techniques. The main focus of this paper is on spatial domain
techniques based on LSB. Various LSB techniques for image steganography have
been covered (Trivedi et al., 2016).
One of
the major goals of steganography techniques is to increase the amount of data
hidden in the cover image; this certainly needs to use a large number of bits
of pixels of the cover image. But, it raises the distortion ratio in the stego
image and affects negatively on the quality of the stego image (Tiwari et al.,
2014).
(Al-Husainy,
2012) proposed a steganography technique ,which reduces the distortion that
occurs in the Stego image pixels through dividing the secret message into a set
of blocks of the same length and finding the best similarity between LSBs of
pixels and the blocks.
An
image steganography technique based on dynamic pattern has been proposed by (Thiyagarajan
et al., 2012). Through generating a dynamic pattern in the selection of
indicator sequence, this technique aims to strengthen the security of hidden
data. To minimize the distortion in the pixels, data should embed in the
insignificant color channel of pixels and exclude the significant color
channel.
(Rana &
Singh, 2010) suggested LSB image steganography technique by using a
pre-determined random selection of pixels; dividing the cover image to a set of
segments and dividing the secret message into four blocks after encrypting it
using data encryption standard (DES) method. A predetermined method is used to
select a pixel in each block; each pixel represents the stego key. Three levels
of security used in this technique through a combination of odd and even rows
and columns respectively.
Novel
steganography technique for the RGB format images has been presented by (Nilizadeh
& Nilchi, 2013). It embeds a secret text in the blue layer of certain
blocks. At the first, each block chooses a unique t1 × t2 matrix of pixels as a
pattern, using the bit difference of neighbourhood pixels, for each keyboard
character. Then, a secret message is hidden in the remaining part of the block.
Blocks are chosen randomly using a random generator for increasing the
security.
(Singh
et al., 2014) proposed an image steganography method that hides a secret
message using the N-Queen matrix (pattern) as the stego key. The value of N in
the N-Queen matrix reflects the level of security in the steganography method.
The numbers of solutions increase with the increase of N.
All
the above, techniques are based on a randomly selecting of LSB of pixels do not
achieve the use of the full capacity of the cover image but they are achieving
good protection against attackers. On the other hand, the traditional LSB
techniques, which are not based on the random selection of LSB of pixels, are
more vulnerable to penetrate by attackers through reading the LSB of pixels in
the stego image sequentially but it is achieving the use of the full capacity
of the cover image.
The
proposed technique works to use all the LSB of the pixels in the cover image in
a random sequence. This will help to achieve the use of the full capacity of
the cover image and provide high protection of the hidden data against the
attackers. It proposed a secret key steganography technique, where it uses a
secret key of size (256×8 bits = 2048 bits).
The
rest of this paper is organized as follows: Proposed method will be introduced
in Section 2. Section 3 presents Experimental results and performance analysis.
In Section 4, Conclusions are drawn.
This
paper presents a secret key image steganography technique to hide the secret
message bits in the cover image. This technique achieves the use of all the
pixels of the cover image and the selection of the pixels in the cover image
randomly. The extraction of chains of elements from the secret key and the use
of different key blocks for each block of pixels in the cover image is the new
approach adopted in this technique. The evaluation tests of the proposed
technique showed that the technique succeeded to achieve the three goals of the
strong steganography techniques which are capacity, robustness, and undetectability.
The
technique uses all the cover image pixels to achieve the full capacity. The
technique uses relatively large Stego secret key (16×16) with the extraction of
a chain of elements from it to achieve maximum randomization in selecting
pixels in the hiding stage which lead to making this technique more robust.
The authors
are grateful to the Middle East University, Amman, Jordan for the financial
support granted to cover the publication fee of this research article.
Al-Husainy, M.A.F., Uliyan, D.M., 2017. Image Encryption Technique based on
the Entropy Value of a Random Block. International
Journal of Advanced Computer Science and Applications, Volume 8(7), pp.
260–266
Al-Husainy, M.A.F., 2012. Message Segmentation to Enhance the Security of LSB
Image Steganography. International
Journal of Advanced Computer Science and Applications, Volume 3(3), pp. 57–62
Nilizadeh, A.F., Nilchi, A.R.N., 2013. Steganography on RGB Images based on
a "Matrix Pattern" using Random Blocks. International Journal of Modern Education and Computer Science,
Volume 5(4), pp. 8–18
Gul, G., Kurugollu, F., 2010. SVD-based Universal Spatial Domain Image
Steganalysis. IEEE Transactions on
Information Forensics and Security, Volume 5(2), pp. 349–353
Hamid, N., Yahya., A., Ahmad, R.B., Al-Qershi, O. M., 2012. Image Steganography
Techniques: An Overview. International Journal
of Computer Science and Security (IJCSS), Volume 6(3), pp. 168–187
Kaur, S., Kaur, A., Singh , K., 2014.
A Survey of Image Steganography. International
Journal of Research in Electronics and Computer Engineering (IJRECE),
Volume 2(3), pp. 102–105
Pal, A.K., Pramanik, T., 2013. Design of an Edge Detection Based Image
Steganography with High Embedding Capacity. International
Conference on Heterogeneous Networking for Quality, Reliability, Security and
Robustness, Springer, Volume 115, pp. 794–800
Prasad, S., Pal, A.K., 2017. An RGB Colour Image Steganography Scheme using
Overlapping Block-based Pixel-value Differencing. Royal Society open science, Volume 4(4), pp. 161066
Purohit, A., Sridhar, P.S.V.S., 2014. Image Steganography: A Review. International Journal of Computer Science
and Information Technologies, Volume 5(4), pp. 4891–4893
Rana, R., Singh, D., 2010. Steganography-concealing Messages in Images using
Lsb Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image.
International Journal of Computer Science
and Communication, Volume 1(2), pp. 113–116
Singh, A., Dhanda, S.K., Kaur, R., 2014. Secure Image Steganography using
N-Queen Puzzle and its Comparison with LSB Technique. International Journal of Innovations in Engineering and Technology
(IJIET), Volume 3(4), pp. 4–8
Subhedar, M.S., Mankar, V.H., 2014. Current Status and Key Issues in Image
Steganography: A Survey. Computer science
review, Volume 13-14, pp. 95–113
Sumathi, C.P., Santanam, T., Umamaheswari, G., 2014. A Study of Various
Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey
(IJCSES), Volume 4(6), pp. 9–25
Thiyagarajan, P., Aghila, G., Venkatesan, V.P., 2012. Dynamic Pattern Based
Image Steganography.
Journal Of Computing, Volume 2(8), pp. 1–9
Tiwari, N., Sandilya, M., Chawla, M., 2014. Spatial Domain Image
Steganography based on Security and Randomization. International Journal of Advanced Computer Science and Applications,
Volume 5(1), pp. 156–159
Trivedi, M.C., Sharma, S., Yadav, V.K., 2016. Analysis of Several Image
Steganography Techniques in Spatial Domain: A Survey. In: Proceedings of the Second International Conference on
Information and Communication Technology for Competitive Strategies, ACM,
Article Number 84
Uliyan, D.M., Al-Husainy, M.A.F., 2017. Detection of Scaled Region
Duplication Image Forgery using Color Based Segmentation with LSB Signature. International Journal Of Advanced Computer
Science And Applications, Volume 8(5), pp. 126–132
Yadav, R.M., Tomar, D.S., Baghel, R.K., 2014. A Study on Image Steganography
Approaches in Digital Images. Engineering
Universe for Scientific Research and Management, Volume 6(5), pp. 1–6