Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks

Full Text (PDF, 620KB), PP.8-18

Views: 0 Downloads: 0

Author(s)

Amir Farhad Nilizadeh 1,* Ahmad Reza Naghsh Nilchi 2

1. Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

2. Department of Artificial Intelligence and Multimedia Engineering, University of Isfahan, Iran

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2013.04.02

Received: 20 Dec. 2012 / Revised: 10 Jan. 2013 / Accepted: 2 Mar. 2013 / Published: 8 Apr. 2013

Index Terms

Steganography, Stego-image, Matrix pattern, Stego-matrix

Abstract

In this paper, we describe a novel spatial domain method for steganography in RGB images where a secret message is embedded in the blue layer of certain blocks. In this algorithm, each block first chooses a unique t1xt2 matrix of pixels as a “matrix pattern” for each keyboard character, using the bit difference of neighbourhood pixels. Next, a secret message is embedded in the remaining part of the block, those without any role in the “matrix pattern” selection procedure. In this procedure, each pattern sums up with the blue layer of the image. For increasing the security, blocks are chosen randomly using a random generator. The results show that this algorithm is highly resistant against the frequency and spatial domain attacks including RS, Sample pair, X2 and DCT based attacks. In addition, the proposed algorithm could provide more than 84.26 times of capacity comparing with a competitive method. Moreover, the results indicated that stego-image has almost 1.73 times better transparency than the competitive algorithm.

Cite This Paper

Amir Farhad Nilizadeh, Ahmad Reza Naghsh Nilchi, "Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks", International Journal of Modern Education and Computer Science (IJMECS), vol.5, no.4, pp.8-18, 2013. DOI:10.5815/ijmecs.2013.04.02

Reference

[1]W. Stallings, “Cryptography and Network Security—Principles and Practices”, fourth ed., Dorling Kindersley (Pearson Education, Pvt. Ltd.), India, 2004.
[2]M. M. Amin, M. Salleh, S. Lbrahim and et al, “Information hiding using steganography”, Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on. IEEE, 2003. DOI:10.1109/NCTT.2003.1188294
[3]A. Cheddad, J. Condell and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods”, Signal Processing 90.3 (2010): 727-752. DOI:10.1016/j.sigpro.2009.08.010
[4]M. Hussain, “Pixel intensity based high capacity data embedding method”, Information and Emerging Technologies (ICIET), 2010 International Conference on. IEEE, 2010. DOI:10.1109/ICIET.2010.5625723
[5]S, Bhattacharyya, and G. Sanyal, “A Robust Image Steganography using DWT Difference Modulation (DWTDM)”, International Journal of Computer Network and Information Security (IJCNIS) 4.7 (2012): 27. DOI: 10.5815/ijcnis.2012.07.04
[6]M. Kharrazi, H. T. Sencar and N. Memon, “Image steganography: Concepts and practice”, Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore (2004). DOI:10.1007/978-3-540-24624-4_3
[7]P. C. Su, and C. C. Kuo, “Steganography in JPEG2000 compressed images”, Consumer Electronics, IEEE Transactions on 49.4 (2003): 824-832. DOI:10.1109/TCE.2003.1261161
[8]E. T. Lin and J. D. Edward, “A review of data hiding in digital images”, IS AND TS PICS CONFERENCE. SOCIETY FOR IMAGING SCIENCE & TECHNOLOGY, 1999. DOI:10.1.1.29.5002
[9]B. Chen, and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding”, Information Theory, IEEE Transactions on 47.4 (2001): 1423-1443. DOI:10.1109/18.923725
[10]A. Gutub, M. Ankeer, M. Abu-Ghalioun, A. Shaheen and et al, “Pixel indicator high capacity technique for RGB image based Steganography”, WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications. 2008.
[11]A. S. Fatemi , A. R. Naghsh-Nilchi and N. Nematbakhsh, “Image Data Hiding based on Graphical Synthesis”, (in Persian), 6th Machine Vision and Image Processing Conference, 29 July 2010.
[12]R. H. Wiggins, H. C. Davidson, H. R. Harnsberger, J. R. Lauman and et al, “Image File Formats: Past, Present, and Future1”, Radiographics 21.3 (2001): 789-798.
[13]http://homepages.cae.wisc.edu/~ece533/images Last visited 2012/11/29
[14]A. Nissar, and A. H. Mir, “Classification of steganalysis techniques: A study”, Digital Signal Processing 20.6 (2010): 1758-1770. DOI:10.1016/j.dsp.2010.02.003.
[15]R. A. Lerski, K. Schad, L. R. Boyce and et al, “VIII. MR image texture analysis—An approach to tissue characterization”, Magnetic resonance imaging 11.6 (1993): 873-887. DOI:10.1016/0730-25X(93)90205-R
[16]A. Westfeld, and A. Pfitzmann, “Attacks on steganographic systems”, Information Hiding. Springer Berlin/Heidelberg, 2000. DOI:10.1007/10719724_5
[17]J. Fridrich, M. Goljan and R. Du, “Detecting LSB steganography in color, and gray-scale images”, Multimedia, IEEE 8.4 (2001): 22-28. DOI:10.1109/93.959097
[18]S. Dumitrescu, X. Wu and Z. Wang, “Detection of LSB steganography via sample pair analysis”, Information Hiding. Springer Berlin/Heidelberg, 2003. DOI:10.1007/3-540-36415-3_23
[19]V. Licks and R. Jordan, “Geometric attacks on image watermarking systems”, Multimedia, IEEE 12.3 (2005): 68-78. DOI:10.1109/MMUL.2005.46
[20]http://sourceforge.net/projects/stegstudio/files/ Last visited 2012/4/7
[21]X. Zhang and S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security”, Pattern Recognition Letters 25.3 (2004): 331-339. DOI:10.1016/j.patrec.2003.10.014
[22]V. Sabeti, S. Samavi, M. Mahdavi and et al, “Steganalysis of pixel-value differencing steganographic method”, Communications, Computers and Signal Processing, 2007. PacRim 2007. IEEE Pacific Rim Conference on. IEEE, 2007. DOI:10.1109/PACRIM.2007.4313232
[23]T. Zhang and X. Ping, “A fast and effective steganalytic technique against JSteg-like algorithms”, Symposium on Applied Computing: Proceedings of the 2003 ACM symposium on Applied computing. Vol. 9. No. 12. 2003. DOI:10.1145/952532.952595
[24]J. Fridrich, M. Goljan and R. Du, “Steganalysis based on JPEG compatibility”, ITCom 2001: International Symposium on the Convergence of IT and Communications. International Society for Optics and Photonics, 2001. DOI:10.1117/12.448213
[25]I. Jackson and S. Sirois, “Infant cognition: going full factorial with pupil dilation”, Developmental science 12.4 (2009): 670-679. DOI:10.1111/j.1467-7687.2008.00805.x
[26]T. S. Sazzad, M. Z. Hasan and F. Mohammed, “Gamma encoding on image processing considering human visualization, analysis and comparison”, International Journal 4 (2012).
[27]J. Lee, S. Choe and S. Lee, “Compression of 3D Mesh Geometry and Vertex Attributes for Mobile Graphics”, Journal of Computing Science and Engineering 4.3 (2010): 207-224.
[28]P. Nithyanandam, T, Ravichandran, N. M. Santron and et al, “A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding”, International Journal of Computer Science and Security (IJCSS) 5.5 (2011): 456.