Improved Bit Plane Splicing LSB Technique for Secret Data Hiding in Images Using Linear Congruent Method

Full Text (PDF, 2364KB), PP.1-14

Views: 0 Downloads: 0

Author(s)

Ibrahim M. Hussain 1,* M. Kamran Khan 1 Mohammad Naseem 1 Aisha Ajmal 2 Osama M. Hussain 2

1. Department of Computer Engineering, Sir Syed University of Engineering and Technology, Karachi, Pakistan

2. Department of Electrical Engineering, Sultan Qaboos University, Muscat, Oman

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2012.07.01

Received: 22 Mar. 2012 / Revised: 8 May 2012 / Accepted: 13 Jun. 2012 / Published: 28 Jul. 2012

Index Terms

Steganography, Bit Plane Splicing Least Significant Bit, Entropy, Linear Congruent, Cover image

Abstract

In this paper, we propose two algorithms based on the popular Bit Plane Splicing Least Significant Bit (LSB) Technique for secret data hiding inside images. One major disadvantage of Bit Plane Splicing LSB technique is its low hiding capacity which results in severe degradation of the cover image upon hiding large amount of data. The proposed algorithms overcome this issue by imposing hiding rules based on the intensity level of pixels. In addition the method for data hiding is done in a non sequential manner using linear congruent random number generators. Experiment results show that the proposed techniques called Optimum Intensity Based Distributed Hiding (OIBDH) technique and Linear Congruent Optimum Intensity Based Distributed Hiding with Key (LC-OIBDH-k) outperforms Bit Plane Splicing LSB technique as they have better hiding capacity with less degradation in the cover image. Furthermore, the proposed algorithms are tested using absolute entropy curves and results show that our proposed techniques have lower absolute entropy difference compared to Bit Plane Splicing LSB technique in all the tested images and for different secret data sizes.

Cite This Paper

Ibrahim M. Hussain,M. Kamran Khan,Mohammad Naseem,Aisha Ajmal,Osama M. Hussain,"Improved Bit Plane Splicing LSB Technique for Secret Data Hiding in Images Using Linear Congruent Method", IJIGSP, vol.4, no.7, pp.1-14, 2012. DOI: 10.5815/ijigsp.2012.07.01 

Reference

[1]Dapeng Wu, Yiwei Thomas Hou, Wenwu Zhu, Ya-Qin Zhang and Jon M. Peha, “Streaming Video over the Internet: Approaches and Directions”, IEEE Transactions on circuits and systems for video technology, vol. 11, no. 3, pp. 282 – 300, 2001.

[2]I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, “Digital Watermarking and Steganography”, 2nd Edition., Morgan Kaufmann Publishers, Massachusetts, California, 2008.

[3]R.J. Anderson and F.A.P. Petitcolas, “On the Limits of Steganography” J. Selected Areas in Comm., vol. 16, no. 4, pp. 474 – 481, 1998.

[4]Sung A.H., Tadiparthi G.R. and Mukkamala S., “Defeating the current steganalysis techniques (robust steganography)”, in proc. of The International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas, Nevada, USA., pp. 440 – 444, 2004.

[5]Chiou-Ting Hsu and Ja-Ling Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58 – 68, 1999.

[6]Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Atal Chaudhuri and Monalisa Banerjee, “An Invisible Color Watermarking Framework for Uncompressed Video Authentication”, International Journal of Computer Applications, vol. 1, no. 11, pp. 22 – 28, 2010.

[7]Guorong Xuan, Jiang Zhu, Jidong Chen, Shi, Y.Q., Zhicheng Ni and Wei Su, “Distortionless data hiding based on integer wavelet transform”, Electronic letters, vol. 38, no. 25, pp. 1646 – 1648, 2002.

[8]Faisal T. Alturkia, Ali F. Almutairib, and Russell M. Mersereauuc, “Analysis of blind data hiding using discrete cosine transform phase modulation. Signal Processing: Image Communication”, vol. 22, no. 4, pp. 347 – 362, 2007.

[9]Chou, J. and Ramchandran K., “Robust turbo-based data hiding for image and video sources”, in proc. of IEEE International Conference on Multimedia and Expo 2002 (ICME '02), Lausanne, Switzerland, pp. 565 – 568, 2002.

[10]Sandipan Dey, Ajith Abraham and Sugata Sanyal, “An LSB Data Hiding Technique Using Prime Numbers”, in proc. of the Third International Symposium on Information Assurance and Security (IAS '07), Manchester, United Kingdom, pp. 101 – 106, 2007.

[11]Chi-Kwong Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution”, Pattern Recognition, vol. 37, no. 3, pp. 469 – 474, 2004.

[12]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang and Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488 – 497, 2008.

[13]Cheng-Hsing Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, vol. 41, no. 8, pp. 2674 – 2683, 2008.

[14]Keiji Yanai and Kobus Barnard, “Image region entropy: a measure of "visualness" of web images associated with one concept”, in proc. of the 13th annual ACM international conference on Multimedia, Singapore, pp. 419 – 422, 2005.

[15]Norman Abramson, “Information Theory and Coding”, 1st edition, McGraw-Hill Education, 1963.

[16]Andrew D. Ker, “Steganalysis of LSB matching in grayscale images”, IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441 – 444, 2005.

[17]P. Hellekalek, “Good random number generators are (not so) easy to find”, Mathematics and Computers in Simulation, vol. 46, no. 5, pp. 485 – 505, 1998.