Abstract
Steganography is a very useful technique which aims at preventing loss of privacy during the process of data communication, especially over the internet. It can involve different forms of media like image, video (i.e., image sequence), audio etc. We propose a novel steganographic approach in spatial domain using pixel value differencing (PVD) or sample value differencing (SVD) technique and Galois field (GF (28)) operations in order to provide a two layered security for hiding message bits. Our method not only has a very high embedding capacity, but is also capable of withstanding statistical attacks. The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.










Similar content being viewed by others
References
Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2017) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur Gener Comput Syst 78, Part 3:1005–1019. https://doi.org/10.1016/j.future.2016.12.028. ISSN. 0167-739X
Boehmm B (2014) Stegexpose a tool for detecting LSB steganography. https://github.com/b3dk7/StegExpose
Burrows M, Abadi M, Needham R (1990) A logic of authentication. DEC SRC Research Report 39
Chakraborty S, Singh JA, Bhatnagar C (2017) LSB Based non blind predictive edge adaptive image steganography. Multimedia Tools Appls 76:7973–7987. https://doi.org/10.1007/s11042-016-3449-4. ISSN. 1573-7721
Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. In: International conference on IEEE image processing. ISBN: 0-7803-7622-6, vol 3, pp 641–644, https://doi.org/10.1109/ICIP.2002.1039052
Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2017) Towards fog-driven IoT ehealth: promises and challenges of IoT in medicine and healthcare. Futur Gener Comput Syst 78 Part 2:659–676. https://doi.org/10.1016/j.future.2017.04.036
Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Secur 10(2):243–255. https://doi.org/10.1109/TIFS.2014.2368364
Fridrich J, Lisonek P (2007) Grid colorings in steganography. IEEE Trans Inf Theory 53(4):1547–1549. https://doi.org/10.1109/TIT.2007.892768
Fridrich J, Lisonek P, Soukal D (2007) On steganographic embedding efficiency. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) IH 2006. LNCS. ISBN. 978-3-540-74124-4, vol 4437. Springer, Heidelberg, pp 282–296, https://doi.org/10.1007/978-3-540-74124-4_19
Hashim AT, Ali YH, Ghazoul SS (2011) Developed method of information hiding in video AVI file based on hybrid encryption and steganography. Eng Tech J 29 (2):359–373. ISSN. 16816900 24120758
Hemlatha S, Dinesh A, Renuka A (2015) Wavelet transform based steganography technique to hide audio signals in image. In: Elsevier B.V. graph algorithms, high performance implementations and its applications, vol 47, pp 272–281. https://doi.org/10.1016/j.procs.2015.03.207
Hrytskiv Z, Voloshynovskiy S, Rytsar Y (1998) Cryptography and steganography of video information in modern communications. In: Third international conference on telecommunications in modern satelite, cable and broadcasting services TELSIKS’97, vol 11, No. 1, pp 164–167
Hu SD, Kin Tak U (2011) A novel video steganography based on non-uniform rectangular partition. In: IEEE international conference on computational science and engineering. ISBN. 978-1-4577-0974-6, pp 57–61, https://doi.org/10.1109/CSE.2011.24
Huang X, Kawashima R, Segawa N, Abe Y (2008) Design and implementation of synchronized audio to audio steganography scheme. In: International conference on intelligent information hiding and multimedia signal processing (IIHMSP). ISBN: 978-0-7695-3278-3. IEEE Xplore, pp 331–334, https://doi.org/10.1109/IIH-MSP.2008.98
Huayong G, Huang M, Wang Q (2011) Steganography and steganalysis based on digital image. In: 4th international congress on image and signal processing (CISP), vol 1. IEEE, pp 252–255. https://doi.org/10.1109/CISP.2011.6099953
Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on LSB insertion and encryption. In: Advances in recent technologies in communication and computing, ARTCom ’09. IEEE, pp 302–305. https://doi.org/10.1109/ARTCom.2009.228
Kak A (2015) Lecture notes on computer and network security. Purdue University
Kim C (2014) Data hiding by an improved exploiting modification direction. Multimedia Tools and Applications 69 (3):569–584. https://doi.org/10.1007/s11042-012-1114-0
Kim C, Shin DK, Shin DI, Zhang X (2011) Improved steganographic embedding exploiting modification direction in multimedia communications. Commun Comput Inf Sci 186:130–138. https://doi.org/10.1007/978-3-642-22339-6_16
Kumar H, Anuradha (2012) Enhanced LSB technique for audio steganography. In: Computing communication networking technologies (ICCCNT) third international conference. IEEE, pp 1–4. https://doi.org/10.1109/ICCCNT.2012.6395978
Liao D, Sun G, Li H, Yu H, Chang V (2017) The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Clust Comput, Springer 20(3):2283–2297. https://doi.org/10.1007/s10586-017-0986-1
Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimedia 12(5):345–357. https://doi.org/10.1109/TMM.2010.2051243
Lou D, Hub C (2012) LSB Steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. In: Information sciences. Elsevier, pp 346–358. https://doi.org/10.1016/j.ins.2011.06.003
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812
Maya ST, Merico N, Meana HP (2006) An image steganography systems based on BPCS and IWT. In: 16th IEEE international conference on electronics, communications and computers (CONIELECOMP), p 51. https://doi.org/10.1109/CONIELECOMP.2006.14
Miller E, Sturmfels B (2006) Combinatorial commutative algebra. Springer, New York
Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using hamming code (7, 4), systems. In: Applications and technology conference (LISAT), IEEE Long Island, pp 1–6. https://doi.org/10.1109/LISAT.2014.6845191
Mukherjee I, Paul G (2013) Efficient multi-bit image steganography in spatial domain. In: Information systems security, chapter 21, lecture notes, vol 8303. Springer, pp 270–284. https://doi.org/10.1007/978-3-642-45204-8_21
Mukherjee N, Bhattacharya A, Bose S (2013) Evolutionary multibit grouping steganographic algorithm. In: Information systems security, LNCS, vol 8303. Springer, pp 285–296. https://doi.org/10.1007/978-3-642-45204-8_22
Paul G, Davidson I, Mukherjee I, Ravi S (2012) Keyless steganography in spatial domain using energetic pixels. In: Venkatakrishnan V, Goswami D (eds) ICISS 2012, LNCS, vol 7671. Springer, pp 134–148. https://doi.org/10.1007/978-3-642-35130-3_10
Paul G, Davidson I, Mukherjee I, Ravi S (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 75:1–27. ISBN: 978-3-642-35129-7
Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Processing 17(5):58–64. https://doi.org/10.1109/79.879339
Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: Second international workshop on information hiding, IH98, Portland, Oregon, U.S.A., Proceedings, LNCS 1525. Springer, pp 219–239. https://doi.org/10.1007/3-540-49380-8_16
Provos N (2001) Defending against statistical steganalysis. In: Tenth USENIX security symposium, pp 325–335
Rudolf L, Harald N Enclicopedia of mathematics and its applications: finite fields, vol 20, part 1. Cambridge University Press, ISBN-13: 978-0521065672
Sajjad M, Khan M, Irfan M, Irfan R, Wook BS (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75:14867–14893. https://doi.org/10.1007/s11042-015-2671-9
Singh S, Siddiqui TJ (2012) A security enhanced robust steganography algorithm for data hiding. Int J Comput Sci Issues 9(3, no. 1):131–139. ISSN (Online). 1694-0814
Socek D, Kalva H, Magliveras SS, Marques O, Culibrk D, Furht B (2007) New approaches to encryption and steganography for digital videos. Multimedia Systems 13(3):191–204. https://doi.org/10.1007/s00530-007-0083-z
Song S, Zhangb J, Liaoa X, Dua J, Wena Q (2011) A novel secure communication protocol combining steganography and cryptography. In: Advanced in control engineering and information science. Elsevier, pp 2767–2772. https://doi.org/10.1016/j.proeng.2011.08.521
Sreekantha DK, Kavya AM (2017) Agricultural crop monitoring using IOT - a study. In: 11th international conference on intelligent systems and control (ISCO), 2017, pp 134–139. https://doi.org/10.1109/ISCO.2017.7855968
Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D (2017) Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J Netw Comput Appl 89:3–13. https://doi.org/10.1016/j.jnca.2016.10.011
Wang ZH, Kieu TD, Chang CC, Li MC (2010) A novel information concealing method based on exploiting modification direction. J Inf Hiding Multimedia Signal Process 1(1):1–9. https://doi.org/10.1007/978-3-642-35473-1_14
Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensics Secur 9(5). https://doi.org/10.1109/TIFS.2014.2308633
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626. https://doi.org/10.1016/S0167-8655(02)00402-6
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proceedings, Vision, Image and Signal Processing 152(5):611–615. https://doi.org/10.1049/ip-vis:20059022
Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285:1725–1735. https://doi.org/10.1016/j.optcom.2011.12.003
Zhou J Introduction to symmetric polynomials and symmetric functions, http://faculty.math.tsinghua.edu.cn/jzhou/symmetricf.pdf
Acknowledgements
The authors would like to thank Mr. Uttiya Ghosh for his partial help in implementation of this project when he was the student of St. Thomas’ College of Engineering & Technology, Kolkata.
Author information
Authors and Affiliations
Corresponding author
Appendix A: StegExpose outputs on sample images
Appendix A: StegExpose outputs on sample images
Rights and permissions
About this article
Cite this article
Mukherjee (Ganguly), N., Paul, G. & Saha, S.K. An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77, 18451–18481 (2018). https://doi.org/10.1007/s11042-018-5720-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5720-3