Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images

Nagaraj V. Dharwadkar, B. B. Amberker

2012

Abstract

The advances in Internet technology and digital image representation helped the user to easily exchange the secret message. On Internet the transmission of the secret message is conducted using digital images which created new needs, issues and opportunities to the researcher. The basic objective of secret message communication is to transmit a message securely by embedding it into a cover-image such that unintended observers are unable to detect it. The image steganographic schemes are used in secret message communication. In this paper, we have proposed reversible steganographic scheme for gray-scale images. This scheme uses dual cover images to hide secret image and generates the perceptually similar dual stegoimages. Further, to extract the secret image the knowledge of dual stegoimages and stego-key are necessary which improved the security of this scheme. The experimental results show that the scheme provides a higher embedding capacity and robustness with un-noticeable distortions in the stegoimages. The performance of the scheme is analyzed for various types of image processing attacks on stegoimage. The proposed scheme was found rigid to the image processing attacks.

References

  1. Alwan, R. H., Kadhim, F. J., and Al-Taani, A. T. (2006). Data embedding based on better use of bits in image pixels. International journal of Signal Processing, 2(2):104-107.
  2. Artz., D. (2001). Digital steganographic: Hiding data within data. IEEE Journal on Internet Computing, 5(3):75-80.
  3. Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3):75-80.
  4. Chan, C. K. and Chen, L. M. (2004). Hiding data in images by simple lsb substitution. Elsevier Pattern Recognition, 37(3):469-474.
  5. Chan, C. K. and Cheng, L. M. (2004). Hiding data in images by simple lsb substitution. Elsevier Pattern Recognition, 37(3):469-474.
  6. Cox, I., Miller, M., Bloom, J. A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography. Morgan Kaufmann Publishers, USA, second edition edition.
  7. Fridrich, J., Goljan, M., and Du, R. (2002). Lossless data embedding new paradigm in digital watermarking. EURASIP Journal on Advances in Signal Processing, 2002(2):185-196.
  8. Honsinger, C. W., Jones, P. W., Rabbani, M., and Stoffel, J. C. (2001). Lossless recovery of an original image containing embedded data.
  9. Kahn, D. (1967). The Codebreakers The story of secret writing. Scribner, New York.
  10. Katzenbesser, S. and Petitcolas, F. (2004). Information Hiding Techniques for Steganography and Watermarking. Artech House, Inc.Norwood, MA, USA.
  11. Ker, A. (2005). Steganalysis of lsb matching in grayscale images. IEEE Signal Processing Letters, 12(6):441- 444.
  12. Lee, C.-F., Wang, K.-H., Chang, C.-C., and Huang, Y.-L. (2009). A reversible data hiding scheme based on dual steganographic images. In ACM proceedings of International Conference On Ubiquitous Information Management And Communication (ICUIMC-09),Suwon, Korea, pages 228-237.
  13. Lee, Y. K. and Chen, L. H. (2000a). High capacity image steganographic model. In IEE Proceedings Vision, Image and Signal Processing, volume 147, pages 288- 294.
  14. Lee, Y. K. and Chen, L. H. (2000b). High capacity image steganography model. In IEEE Proceedings of Vision,Image and Signal Processing, volume 147, pages 288-294.
  15. Mielikainen, J. (2006). Lsb matching revisited. IEEE Signal Processing Letters, 13(5):285-287.
  16. Nagaraj V. Dharwadkar, B. B. A. (2010). Steganographic scheme for gray-level image using pixel neighborhood and lsb substitution. 10(4):589-607.
  17. Nagaraj V.Dharwadkar, B. B. A. (2010). An improved reversible steganography scheme based on dual cover images. International Journal of Multimedia Intelligence and Security, 1(4):336-349.
  18. Sharp, T. (2001). An implementation of key-based digital signal steganography. In IEEE Proceedings of Information Hiding Workshop, volume 2137, pages 13-26. Springer LNCS.
  19. Thien, C. C. and Lin, J. C. (2003). A simple and highhiding capacity method for hiding digit-by-digit data in images based on modulus function. Elsevier Pattern Recognition, 36(12):2875-2881.
  20. Tian (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8):890-893.
  21. W, B., D, G., N, M., and A, L. (1996). Techniques for data hiding. 35(3-4):313-336.
  22. Wang, R. Z., Lin, C. F., and Lin, J. C. (2001). Image hiding by optimal lsb substitution and genetic algorithm. Elsevier Pattern Recognition, 34(3):671-683.
  23. Zou, D., Wu, C. W., Xuan, G., and Shi, Y. Q. (2003). A content based image authentication system with lossless data hiding. In Proceedings of Multimedia Expo International Conference, volume 2, pages 213-216. IEEE.
Download


Paper Citation


in Harvard Style

V. Dharwadkar N. and B. Amberker B. (2012). Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 15-24. DOI: 10.5220/0003975700150024


in Bibtex Style

@conference{secrypt12,
author={Nagaraj V. Dharwadkar and B. B. Amberker},
title={Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={15-24},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003975700150024},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images
SN - 978-989-8565-24-2
AU - V. Dharwadkar N.
AU - B. Amberker B.
PY - 2012
SP - 15
EP - 24
DO - 10.5220/0003975700150024