Abstract
Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the stego-image and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hernandez-Chamorro, A., Espejel-Trujillo, A., Lopez-Hernandez, J., Nakano-Miyatake, M., Perez-Meana, H.: A Methodology of Steganalysis for Images. In: IEEE CONIELECOMP 2009, Cholula, Puebla, Mexico, pp. 102–106 (2009)
Li, B., He, J., Huang, J., Shi, Y.Q.: A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2(2), 142–172 (2011)
Lin, C.-C.: An information hiding scheme with minimal image distortion. Computer Standards & Interfaces 33(5), 477–484 (2011)
Swain, G., Lenka, S.K.: A Better RGB Channel Based Image Steganography Technique. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds.) ObCom 2011, Part II. CCIS, vol. 270, pp. 470–478. Springer, Heidelberg (2012)
Swain, G., Lenka, S.K.: LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds.) ObCom 2011, Part II. CCIS, vol. 270, pp. 479–488. Springer, Heidelberg (2012)
Pandian, N., Thangavel, R.: A Hybrid Embedded Steganography Technique: Optimum Pixel Method and Matrix Embedding. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 1123–1130. ACM (2012)
Al-Hunaity, M.F., Najim, S.A., El-Emary, I.M.: Colored Digital Image Watermarking using the Wavelet Technique. American Journal of Applied Sciences 4(9), 658–662 (2007)
Liu, Q.: Steganalysis of DCT-Embedding Based Adaptive Steganography and YASS. In: The 13th ACM Multimedia Workshop on Multimedia and Security, pp. 77–85. ACM (2011)
Rabie, T.: Digital Image Steganography: An FFT Approach. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 217–230. Springer, Heidelberg (2012)
Sajedi, H., Jamzad, M.: Using contourlet transform and cover selection for secure steganography. International Journal of Information Security 9(5), 337–352 (2010)
Stallings, W.: Cryptography and Network Security Principles and Practice. Prentice Hall, USA (2006)
Li, H., Friggstad, Z.: An Efficient Architecture for the AES Mix Columns Operation. In: Proceeding of ISCAS 2005, Kobe, Japan, pp. 4637–4640 (2005)
Addition and Multiplication Tables in Galois Fields GF(2^m), http://www.ee.unb.ca/cgi-bin/tervo/galois3.pl (last accessed May 30, 2013)
Yua, Y.-H., Chang, C.-C., Lin, I.-C.: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107(3), 183–194 (2007)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: The SSIM Index for Image Quality Assessment, http://www.cns.nyu.edu/~lcv/ssim/ (last accessed: May 19, 2013)
Roussos, A., Maragos, P.: Vector-Valued Image Interpolation by an Anisotropic Diffusion-Projection PDE. In: Sgallari, F., Murli, A., Paragios, N. (eds.) SSVM 2007. LNCS, vol. 4485, pp. 104–115. Springer, Heidelberg (2007)
Upreti, K., Verma, K., Sahoo, A.: Variable Bits Secure System for Color Images. In: Proceedings of the 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 105–107. IEEE (2010)
Lee, C.-F., Chen, H.-L., Tso, H.-K.: Embedding capacity raising in reversible data hiding based on prediction of difference expansion. Journal of Systems and Software 83(10), 1864–1872 (2010)
Salomon, D.: Coding for Data and Computer Communications, p. 345. Springer (April 12, 2005) ISBN-13: 978-0387212456
MATLAB: The Language of Technical Computing, http://www.mathworks.com/products/matlab/ (last accessed May 30, 2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Abduallah, W.M., Rahma, A.M.S., Pathan, AS.K. (2013). Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds) Security and Privacy in Communication Networks. SecureComm 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-319-04283-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-04283-1_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04282-4
Online ISBN: 978-3-319-04283-1
eBook Packages: Computer ScienceComputer Science (R0)