High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
Abstract
:1. Introduction
2. Related Work
3. The Proposed Method
- Case 1:
- If first secret bit pair (i.e., M1) is matched with the CL,pixel of a cover pixel then BL,pixel is replaced with ‘1’ otherwise replaced it with ‘0’.
- Case 2:
- Similarly, if the second secret bit pair (i.e., M2) is matched with CR,pixel, it substitutes BR,pixel with ‘1’ otherwise replaces it with ‘0’.
- Case 3:
- If either BL,pixel or BR,pixel is ‘0’, then the 2-LSBs of very next cover pixel would be replaced with the previous unmatched secret bit pair (i.e., M1 or M2).
- Case 4:
- If both BL,pixel and BR,pixel are ‘0’, it would indicate the skipped mapped block (which does not contain any mapping).
- Case 1:
- If BL,pixel is ‘1’ and BR,pixel is ‘0’, restore CL,pixel as a first secret pair (M1) and restore the 2-LSBs of the next pixel as a second secret pair (M2).
- Case 2:
- If BL,pixel is ‘0’ and BR,pixel is ‘1’, restore CR,pixel as a second secret pair (M2) and restore the 2-LSBs of the next pixel with a first secret pair (M1).
- Case 3:
- If both BL,pixel and BR,pixel are ‘1’, then restore the first secret pair (M1) from CL,pixel and similarly, restore the second secret pair (M2) from the CR,pixel bits.
- Case 4:
- If both BL,pixel and BR,pixel are ‘0’, it would indicate the unmapped block (which does not contain any mapping).
4. Experimental Results
4.1. Embedding Capacity and Visual Quality Analysis
4.2. Peak Signal to Noise Ratio (PSNR) Analysis on Various Embedding Levels
4.3. Histogram Analysis
4.4. Security against RS Steganalysis
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Hussain, M.; Wahab, A.W.A.; Idris, Y.I.B.; Ho, A.T.; Jung, K.H. Image steganography in spatial domain: A survey. Signal Proc. Image Commun. 2018, 65, 46–66. [Google Scholar] [CrossRef]
- Yesilyurt, M.; Yalman, Y. New approach for cloud computing security: Using data hiding methods. Sadhana 2016, 41, 1289–1298. [Google Scholar]
- Liu, Y.N.; Zhong, Q.; Xie, M.; Chen, Z.B. A novel multiple-level secret image sharing scheme. Multimed. Tools Appl. 2018, 77, 6017–6031. [Google Scholar] [CrossRef]
- Xiang, T.; Hu, J.; Sun, J. Outsourcing chaotic selective image encryption to the cloud with steganography. Digit. Signal Proc. 2015, 43, 28–37. [Google Scholar] [CrossRef]
- Tondwalkar, A.; Jani, P.V. Secure localisation of wireless devices with application to sensor networks using steganography. Proc. Comput. Sci. 2016, 78, 610–616. [Google Scholar] [CrossRef]
- Fridrich, J.; Goljan, M.; Du, R. Reliable detection of LSB steganography in color and grayscale images, New Challenges. In Proceedings of the 2001 Workshop on Multimedia and Security, Ottawa, ON, Canada, 5 October 2001; pp. 27–30. [Google Scholar]
- Yang, H.; Sun, X.; Sun, G. A high-capacity image data hiding scheme using adaptive LSB substitution. Radio Eng. 2009, 18, 509–516. [Google Scholar]
- Tseng, H.W.; Leng, H.S. High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process. 2014, 8, 647–654. [Google Scholar] [CrossRef]
- Jung, K.H.; Yoo, K.Y. Steganographic method based on interpolation and LSB substitution of digital images. Multimed. Tools Appl. 2015, 74, 2143–2155. [Google Scholar] [CrossRef]
- Mohamed, M.H.; Mohamed, L.M. High capacity image steganography technique based on LSB substitution method. Appl. Math. Inf. Sci. 2016, 10, 259–266. [Google Scholar] [CrossRef]
- Liao, X.; Wen, Q.Y.; Zhang, J. A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 2011, 22, 1–8. [Google Scholar] [CrossRef]
- Wu, D.C.; Tsai, W.H. A steganographic method for images by pixel value differencing. Pattern Recognit. Lett. 2003, 24, 1613–1626. [Google Scholar] [CrossRef]
- Swain, G. A steganographic method combining LSB substitution and PVD in a block. Proc. Comput. Sci. 2016, 85, 39–44. [Google Scholar] [CrossRef]
- Hussain, M.; Wahab, A.W.A.; Javed, N.; Jung, K.H. Recursive information hiding scheme through LSB, PVD shift, and MPE. IETE Technol. Rev. 2018, 35, 53–63. [Google Scholar] [CrossRef]
- Khodaei, M.; Bigham, B.S.; Faez, K. Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern. Syst. 2016, 47, 617–628. [Google Scholar] [CrossRef]
- Akhtar, N. An LSB substitution with bit inversion steganography method. In Proceedings of the 3rd International Conference on Advanced Computing, Networking and Informatics, New Delhi, India, 25–27 February 2016; pp. 515–521. [Google Scholar]
- Bai, J.; Chang, C.C.; Nguyen, T.S.; Zhu, C.; Liu, Y. A high payload steganographic algorithm based on edge detection. Displays 2017, 46, 42–51. [Google Scholar] [CrossRef]
- Lee, H. Data hiding in spatial color images on smartphones by adaptive RGB LSB replacement. IEICE Trans. Informat. Syst. 2018, 101, 2163–2167. [Google Scholar] [CrossRef]
- Kuo, W.C.; Kuo, S.H.; Wuu, L.C. Multi-bit data hiding scheme for compressing secret messages. Appl. Sci. 2015, 5, 1033–1049. [Google Scholar] [CrossRef]
- Sethi, P.; Kapoor, V. A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Proc. Comput. Sci. 2016, 87, 61–66. [Google Scholar] [CrossRef]
- Muhammad, K.; Ahmad, J.; Rehman, N.U.; Jan, Z.; Sajjad, M. CISSKA-LSB: Color image steganography using stego key-directed adaptive LSB substitution method. Multimed. Tools Appl. 2016, 76, 8597–8626. [Google Scholar] [CrossRef]
- Hong, W. Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry 2018, 10, 36. [Google Scholar] [CrossRef]
- Setiadi, D.R.I.M.; Jumanto, J. An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection. Cybern. Informat. Technol. 2018, 18, 74–88. [Google Scholar] [CrossRef]
- The USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 2 April 2018).
- Swain, G. Steganography in digital images using maximum difference of neighboring pixel values. Int. J. Secur. Appl. 2013, 7, 284–294. [Google Scholar] [CrossRef]
Approaches | Embedding Capacity (bpp) | Visual Quality (PSNR) | Undetectability Security | Maximum Used LSBs/byte |
---|---|---|---|---|
Tseng et al. 2014 [8] | 3.16 | 33.40 | - | 4 bits LSB |
Jung and Yoo 2015 [9] | 2.55 | 37.56 | - | 3 bits LSB |
Mohamed and Mohamed 2016 [10] | 3.19 | 38.87 | - | 4 bits LSB |
Swain et al. 2016 [13] | 3.17 | 39.29 | RS analysis | 3 bits LSB |
Khodaei et al. 2016 [15] | 3.13 | 38.42 | - | 4 bits LSB |
Hussain et al. 2018 [14] | 3.11 | 38.40 | RS analysis | 3 bits LSB |
Bai et al. 2018 [17] | 4.05 | 30.10 | - | 1–5 bits LSB |
Lee et al. 2018 [18] | 2.83 | 43.7 | - | All 4 bits LSB or Two 3 bits one-2 bits RGB LSB |
Wien. 2018 [22] | ~1.0 | 32.27 | - | 1 bits |
Setiadi and Jumanto. 2018 [23] | 1.13 | 47.83 | - | 1 bits + 2 bits + 3 bits RGB LSB |
Input | Stego key (K), secret message (m), and cover image (C) |
Output | Stego image (S) |
Step 1 | Convert K into Sum value. |
(a) | Find values of K components P1, P2, P3, …, Pk where k is the length of K using ASCII table. (e.g., K = Alif2s)
|
(b) | Compute Sum value using the following formula
|
Step 2 | Compute M. |
(a) | Set the bits in m as mbit = m1, m2, m3, …, mn where n is the length of m. |
(b) | Set the permutated bits in m as gbit = g1, g2, g3, …, gn. |
(c) | Set the bits in M as Mbit = Mb1, Mb2, Mb3, …, Mbn. |
(d) | Set the permutated bit position of mbit as posbit = pos1, pos2, pos3, …, posn. |
(e) | Find M by permuting mbit using following formula.
|
Step 3 | Group M bits into pairs (e.g., total number of M bits = 32). Mpair = M1, M2, M3, …, M16. |
Step 4 | Group four MSBs in every pixel of C into two pairs. |
(a) | Two MSBs are grouped in a pair. CL,pixel = CL,1, CL,2, CL,3,…, CL,16. |
(b) | The remaining two bits are grouped in a pair. CR,pixel = CR,1, CR,2, CR,3,…,CR,16. |
Step 5 | Set the two LSBs in every pixel as BL,pixel and BR,pixel. |
(a) | The LSB is assigned as BR,pixel = BR,1, BR,2, BR,3,…, BR,16. |
(b) | The remaining bit is assigned as BL,pixel = BL,1, BL,2, BL,3,…, BL,16. |
Step 6 | Embedding process |
(a) | Compare M1 with CL,1. If the bits are equal, replace BL,1 with 1. Otherwise, replace with 0 |
(b) | Compare M2 with CR,1. If the bits are equal, replace BR,1 with 1. Otherwise, replace with 0 |
(c) | If [BL,1; BR,1] = [1; 0]
|
If [BL,1; BR,1] = [0; 1]
| |
If [BL,1; BR,1] = [0; 0]
| |
If [BL,1; BR,1] = [1; 1]
| |
Step 7 | Stop if all Mpair have been used. |
Input | Stego image (S) and stego key (K) |
Output | Secret message (m) |
Step 1 | Extraction process |
(a) | If [BL,1; BR,1] = [1; 0]
|
If [BL,1; BR,1] = [0; 1]
| |
If [BL,1; BR,1] = [0; 0]
| |
If [BL,1; BR,1] = [1; 1]
| |
Step 2 | Continue step 1 until all Mpair have been extracted. |
Step 3 | Combine all extracted Mpair as M. |
Step 4 | Convert K into Sum value. |
(a) | Find values of K components P1, P2, P3, …, Pk where k is the length of K using ASCII table. (e.g., K = Alif2s)
|
(b) | Compute Sum value using the following formula
|
Step 5 | Compute m. |
(a) | Set the bits in M as Mbit = Mb1, Mb2, Mb3, …, Mbn where n is the length of M. |
(b) | Set the permutated bits in M as fbit = f1, f2, f3, …, fn |
(c) | Set the bits in m as mbit = m1, m2, m3, …, mn |
(d) | Set the permutated bit position of Mbit as posbit = pos1, pos2, pos3, …, posn. |
(e) | Find m by permuting Mbit using following formula.
|
Method | Yang et al. 2009 [7] | Liao et al. 2011 [11] | Khodaei et al. 2016 [15] | Proposed Method | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Images | Capacity (bits) | Bits/Pixel (bpp) | PSNR (dB) | Modified Bits/Pixel | Capacity (bits) | Bits/Pixel (bpp) | PSNR (dB) | Modified Bits/Pixel | Capacity (bits) | Bits/Pixel (bpp) | PSNR (dB) | Modified Bits/Pixel | Capacity (bits) | Bits/Pixel (bpp) | PSNR (dB) | Modified Bits/Pixel |
Aerial | 758,163 | 2.89 | 39.94 | 2.27 | 801,143 | 3.06 | 39.25 | 2.35 | 812,592 | 3.10 | 38.42 | 2.57 | 825,175 | 3.15 | 42.14 | 1.86 |
Airplane | 734,642 | 2.80 | 39.81 | 2.36 | 825,662 | 3.15 | 39.61 | 2.19 | 826,164 | 3.15 | 37.53 | 2.65 | 856,628 | 3.27 | 41.85 | 1.89 |
APC | 769,075 | 2.93 | 40.14 | 2.32 | 803,537 | 3.07 | 39.26 | 2.22 | 805,530 | 3.07 | 38.74 | 2.32 | 867,990 | 3.31 | 42.35 | 1.91 |
Boat | 778,648 | 2.97 | 39.58 | 2.09 | 842,486 | 3.21 | 39.56 | 2.31 | 822,492 | 3.14 | 38.51 | 2.79 | 833,482 | 3.18 | 41.75 | 1.94 |
Car | 797,597 | 3.04 | 39.59 | 2.12 | 816,695 | 3.12 | 38.91 | 2.46 | 810,783 | 3.09 | 38.95 | 2.46 | 855,914 | 3.27 | 42.47 | 1.79 |
Couple | 785,760 | 3.00 | 40.61 | 2.25 | 806,096 | 3.08 | 39.71 | 2.23 | 822,729 | 3.14 | 37.95 | 2.71 | 831,462 | 3.17 | 42.66 | 1.80 |
Gray21 | 767,179 | 2.93 | 39.87 | 2.43 | 820,781 | 3.13 | 39.41 | 2.51 | 841,186 | 3.21 | 38.56 | 2.46 | 849,714 | 3.24 | 41.74 | 1.77 |
Motion | 725,028 | 2.77 | 39.68 | 2.21 | 808,820 | 3.09 | 39.06 | 2.08 | 812,757 | 3.10 | 37.91 | 2.51 | 862,853 | 3.29 | 41.59 | 1.95 |
Ruler | 768,931 | 2.93 | 39.66 | 2.20 | 813,329 | 3.10 | 38.61 | 2.22 | 830,549 | 3.17 | 38.46 | 2.74 | 872,136 | 3.33 | 42.32 | 1.69 |
Stream | 745,624 | 2.84 | 40.23 | 2.24 | 827,024 | 3.15 | 39.82 | 2.34 | 813,358 | 3.10 | 38.67 | 2.88 | 848,472 | 3.24 | 42.49 | 1.93 |
Tank | 794,153 | 3.03 | 39.78 | 2.08 | 804,163 | 3.07 | 39.59 | 2.47 | 836,372 | 3.19 | 38.41 | 2.73 | 864,835 | 3.30 | 42.15 | 1.87 |
Truck | 756,642 | 2.89 | 39.75 | 2.41 | 818,452 | 3.12 | 38.73 | 2.29 | 814,381 | 3.11 | 38.88 | 2.69 | 823,499 | 3.14 | 42.31 | 1.98 |
Average | 765,120 | 2.92 | 39.89 | 2.25 | 815,682 | 3.11 | 39.29 | 2.31 | 820,741 | 3.13 | 38.42 | 2.63 | 849,347 | 3.24 | 42.15 | 1.87 |
Volume 1 | Volume 2 | Volume 3 | Volume 4 | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Method | Resolution | Average Capacity | Average PSNR | Resolution | Average Capacity | Average PSNR | Resolution | Average Capacity | Average PSNR | Resolution | Average Capacity | Average PSNR |
Yang et al. [7] | N/A | N/A | N/A | N/A | N/A | N/A | 256 × 256 (14 images) | 192,554 | 40.60 | 256 × 256 (59 images) | 192,293 | 39.88 |
Liao et al. [11] | 204,952 | 38.56 | 204,527 | 39.28 | ||||||||
Khodaei et al. [15] | 205,545 | 38.59 | 206,082 | 38.52 | ||||||||
Proposed Method | 213,044 | 41.86 | 213,432 | 42.11 | ||||||||
Yang et al. [7] | 512 × 512 (130 images) | 765,075 | 39.80 | 512 × 512 (12 images) | 764,130 | 40.12 | 512 × 512 (22 images) | 766,814 | 39.88 | 512 × 512 (10 images) | 760,609 | 39.79 |
Liao et al. [11] | 815,366 | 39.23 | 815,284 | 39.37 | 815,863 | 39.37 | 814,808 | 39.29 | ||||
Khodaei et al. [15] | 820,537 | 38.50 | 820,752 | 38.31 | 821,206 | 38.39 | 819,487 | 38.41 | ||||
Proposed Method | 848,971 | 42.22 | 848,324 | 42.02 | 848,925 | 42.25 | 850,975 | 42.04 | ||||
Yang et al. [7] | 1024 × 1024 (25 images) | 3,068,218 | 39.87 | 1024 × 1024 (25 images) | 3,067,924 | 39.88 | 1024 × 1024 (3 images) | 3,060,506 | 38.84 | N/A | N/A | N/A |
Liao et al. [11] | 3,266,064 | 39.37 | 3,266,786 | 39.22 | 3,260,171 | 39.31 | ||||||
Khodaei et al. [15] | 3,285,862 | 38.28 | 3,288,377 | 38.53 | 3,282,716 | 38.27 | ||||||
Proposed Method | 3,394,497 | 42.19 | 3,386,517 | 42.31 | 3,407,548 | 42.23 | ||||||
Yang et al. [7] | N/A | N/A | N/A | 2250 × 2250 (1 image) | 14,803,939 | 39.73 | N/A | N/A | N/A | N/A | N/A | N/A |
Liao et al. [11] | 15,703,642 | 39.12 | ||||||||||
Khodaei et al. [15] | 15,913,361 | 38.34 | ||||||||||
Proposed Method | 16,403,103 | 42.09 |
Method | Yang et al. [7] | Liao et al. [11] | Khodaei et al. [15] | Proposed Method | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Images | Capacity (bits) | |RM − R−M| | |SM − S−M| | Capacity (bits) | |RM − R−M| | |SM − S−M| | Capacity (bits) | |RM − R−M| | |SM − S−M| | Capacity (bits) | |RM − R−M| | |SM − S−M| |
Aerial | 758,163 | 0.1661 | 0.1490 | 801,143 | 0.2161 | 0.1704 | 812,592 | 0.1868 | 0.1540 | 825,175 | 0.1615 | 0.1373 |
Airplane | 734,642 | 0.2272 | 0.1779 | 825,662 | 0.2618 | 0.2156 | 826,164 | 0.2535 | 0.1883 | 856,628 | 0.2141 | 0.1632 |
APC | 769,075 | 0.1958 | 0.1491 | 803,537 | 0.2230 | 0.1812 | 805,530 | 0.2017 | 0.1637 | 867,990 | 0.1879 | 0.1431 |
Boat | 778,648 | 0.1549 | 0.1248 | 842,486 | 0.1996 | 0.1541 | 822,492 | 0.1796 | 0.1356 | 833,482 | 0.1522 | 0.1160 |
Car | 797,597 | 0.2394 | 0.1824 | 816,695 | 0.2713 | 0.2320 | 810,783 | 0.2553 | 0.1985 | 855,914 | 0.2183 | 0.1698 |
Couple | 785,760 | 0.2483 | 0.1938 | 806,096 | 0.2924 | 0.2645 | 822,729 | 0.2728 | 0.2301 | 831,462 | 0.2320 | 0.1801 |
Gray21 | 767,179 | 0.2142 | 0.1661 | 820,781 | 0.2585 | 0.2035 | 841,186 | 0.2440 | 0.1831 | 849,714 | 0.2027 | 0.1527 |
Motion | 725,028 | 0.1401 | 0.1135 | 808,820 | 0.1872 | 0.1415 | 812,757 | 0.1609 | 0.1229 | 862,853 | 0.1354 | 0.1071 |
Ruler | 768,931 | 0.1626 | 0.1377 | 813,329 | 0.2097 | 0.1687 | 830,549 | 0.1819 | 0.1426 | 872,136 | 0.1566 | 0.1349 |
Stream | 745,624 | 0.2437 | 0.1850 | 827,024 | 0.2859 | 0.2453 | 813,358 | 0.2682 | 0.2148 | 848,472 | 0.2238 | 0.1755 |
Tank | 794,153 | 0.1425 | 0.1192 | 804,163 | 0.1942 | 0.1463 | 836,372 | 0.1622 | 0.1272 | 864,835 | 0.1401 | 0.1114 |
Truck | 756,642 | 0.2010 | 0.1513 | 818,452 | 0.2301 | 0.1974 | 814,381 | 0.2254 | 0.1759 | 823,499 | 0.1992 | 0.1505 |
Average | 765,120 | 0.1947 | 0.1542 | 815,682 | 0.2358 | 0.1934 | 820,741 | 0.2160 | 0.1697 | 849,347 | 0.1853 | 0.1451 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zakaria, A.A.; Hussain, M.; Wahab, A.W.A.; Idris, M.Y.I.; Abdullah, N.A.; Jung, K.-H. High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution. Appl. Sci. 2018, 8, 2199. https://doi.org/10.3390/app8112199
Zakaria AA, Hussain M, Wahab AWA, Idris MYI, Abdullah NA, Jung K-H. High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution. Applied Sciences. 2018; 8(11):2199. https://doi.org/10.3390/app8112199
Chicago/Turabian StyleZakaria, Abdul Alif, Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Norli Anida Abdullah, and Ki-Hyun Jung. 2018. "High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution" Applied Sciences 8, no. 11: 2199. https://doi.org/10.3390/app8112199
APA StyleZakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A., & Jung, K. -H. (2018). High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution. Applied Sciences, 8(11), 2199. https://doi.org/10.3390/app8112199