Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques
Introduction
As the usage of the Internet becomes increasingly popular, online data exchange becomes extremely easy as well. While many gain great benefits through the Internet, they also encounter many serious problems with it. Piracy of private data serves as a good example. In order to remedy the drawback of data communication on the Internet, many data security techniques have been proposed. In general, there are two types of data security schemes, i.e. steganography and watermarking. Steganography techniques [1], [2], [3], [4], [5], [6] conceal secret data into a cover image so that other people cannot find it. Watermarking techniques [7], [8], [9] usually conceal a logo in authors’ works. In this paper, we propose a steganography scheme for image camouflage, in which a secret image is concealed into a cover image of the same size.
Based on an embedded zerotree wavelet compression method and bit-plane complexity segmentation skill, Spaulding et al. [10] proposed a steganography scheme. From his experimental results, it achieved a large embedding capacity of around 255 of the compressed image size with little noticeable degradation in image quality. Wang [11] proposed a steganography scheme that used a modulus operation to incorporate secret data into a host image. In his paper, a half and a quarter of the chosen host image size were used to demonstrate that the secret image can totally be embedded with high image quality preservation.
Lie and Chang [12] proposed a method based on the human visual system to embed a series of secret data into a cover image. The embedding process is achieved by means of the least adaptive number of significant bits. In their approach, a higher hiding efficiency is obtained by using the concept of a self-contained number of LSBs under the constraint of human visual perception. In the extracting process, the secret data can be extracted without the original cover image.
Wang et al. [13] published a method of hiding data in images by optimal moderately significant bit (MSB) replacement. They presented a scheme consisting of ciphering, optimal substitution and pixel adjustment to implement the hiding process. However, embedding secret data in the MSB is accompanied by paying the cost of degradation of the cover images quality.
An approach, using image binary tree encoding and image smoothing to complete data hiding, was proposed by Hou and Chiao [14]. They created a binary tree code for a smooth secret image and embedded it into the cover image by bit replacement. In their approach, concealing a larger image in a smaller image becomes possible, and different types of data (image, audio, video, and text) can be used as the secret data.
Wu and Tsai [15] published an image data hiding method that employs multiple-based number conversion and lossy data compression. A stego-image is obtained by embedding secret data into selected pixels with a capacity that is determined by the difference of the cover image and the loosely processed cover image. In the extracting process, however the original cover image is required to extract the secret data.
For concealing the secret image into the same size of cover image, a kind of image compression technique with low bit rate and high reconstructed image quality is necessary. Shapiro [16] proposed the embedded zerotree wavelet (EZW), a very effective and computationally simple technique for image compression. Said and Pearlman [17] presented a new implementation based on set partitioning in hierarchical tree (SPIHT) that is an enhanced version of EZW. The SPIHT algorithm not only better performance than EZW but also features its extremely fast coding procedure provided by SPIHT. With the high reconstruction quality and low bit rate property, it is well suited secret image compression. Another SPIHT codec can be found in [18], [19].
Yang et al. [20] presented a compression-domain watermarking technique based on the SPIHT coding. It is different from the conventional methods that incorporate watermarks into transformed coefficients. In their approach, a binary watermarking sequence was directly impressed on the bitstream generated in a quantization process. Meanwhile, the performance of their scheme can be enhanced with minimal complexity by a joint optimization of quantization and watermarking.
For steganography schemes, several papers have already proposed concealing large-sized images without noticeable degradation. In this paper, we use an excellent data compression scheme, a set partitioning in hierarchical trees (SPIHT) coding to achieve concealment of larger secret images without noticeable degradation. In addition, the phase of the coefficients of the DFT block was used to embed the secret data and construct a full cover image without damage. On the other hand, we develop a fold phase distribution differential phase-shift keying (FPDPSK) technique to replace the standard DPSK technique to increase the noise margin, decrease noticeable degradation, and improve the imperceptibility. The remainder of this paper is organized as follows. The codec of the set partitioning in hierarchical trees coding is presented in Section 2. The principle of differential phase-shift keying is in Section 3. The proposed data-embedding algorithm is in Section 4, the data extracting process from the stego-image is illustrated in Section 5, the empirical tests and security analysis are in Section 6, and finally Section 7 concludes this paper.
Section snippets
Set partitioning in hierarchical trees
Embedded zerotree wavelet (EZW) coding is a very effective and computationally simple technique for image compression. The set partitioning in hierarchical trees (SPIHT) coding is an improved version of the EZW. The coding and decoding procedures of SPIHT are extremely fast compared to EZW. However, some symbols must be defined in the SPIHT encoding process. A list of significant pixels (LSP) is used to store all the significant coefficients. Another list of insignificant pixels (LIP) is an
The principle of differential phase-shift keying
We may view differential phase-shift keying (DPSK) as the non-coherent version of PSK. In effect, with binary DPSK returning ‘0’, the phase of current signal waveform is inverse (180) degrees, and returning ‘1’, the current waveform remains unchanged. The receiver is equipped with a storage capability so that it can measure the relative phase difference between the waveform received during two successive bit intervals. Provided that the unknown phase θ contained in the received wave varies
Data-embedding algorithm
A steganography scheme must be extremely secure against all kinds of attacks, and should not reduce the visual quality of the cover image when the secret image is concealed. In our scheme, several strategies are used to guarantee this security and imperceptibility. For the security, the chaotic mechanism (CM) and pseudo-random number generator (PRNG) are used to construct a very secure scheme. Regarding the imperceptibility, the set partitioning in hierarchical trees (SPIHT) coding, discrete
Data extracting algorithm
In the secret data recovering process the inverse of the concealing process is used to extract the secret image. The flow chart of the recovering process is shown in Fig. 11. The stego-image R′ is separated into (R, G, and B planes), and then transferred to by DFT. The locations are exactly the same as was used in the embedding and selected by means of the block selection, coefficients selection, and the PN2 sequence with its private key. Once the locations are determined, a
Empirical tests
According to the human visual system, some distortions between the cover-image and the stego-image are allowed. In this paper, we employ the PSNR to indicate the degree of transparency. The PSNR is given by the following formula:where Xi,j, Ri,j are the gray-scale levels of the cover-image and the stego-image of size N × N, respectively.
In this paper, several color images (Pepper, Lena, F16, and Tiffany) with size 512 × 512 were used as secret images
Conclusions
The differential phase-shift keying technique is widely used in digital communication systems. In this research, we used this technique to develop a steganography scheme aim to hide the “secret image” into a cover image of the same size, and present the resultant image without any noticeable degradation. Several additional techniques were used to reach our goal; the SPIHT compressed the secret image and compressed the secret data. CM mechanisms and PN2 randomly selected blocks strongly
References (22)
- et al.
Secret image sharing with steganography and authentication
The Journal of System and Software
(2004) - et al.
A new blind method for detecting novel steganography
Digital Investigation
(2005) - et al.
A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
Pattern Recognition
(2005) - et al.
Secure semi-blind watermarking based on iteration mapping and image features
Pattern Recognition
(2005) - et al.
BPCS steganography using EZW lossy compressed images
Patter Recognition Letters
(2002) Steganography of capacity required using modulo operator for embedding secret image
Applied Mathematics and Computation
(2005)Color image steganography scheme using set partitioning in hierarchical trees coding, digital fourier transform and adaptive phase modulation
Applied Mathematics and Computation
(2007)- et al.
Spread spectrum image steganography
IEEE Transactions on Image Processing
(1999) - et al.
On the limits of steganography
IEEE Transactions on Selected Areas in Communication
(1998) - et al.
Deteting LSB steganography in color and gray-scale images
IEEE Transactions on Multimedia
(2001)
Cited by (46)
The infinite race between steganography and steganalysis in images
2022, Signal ProcessingCitation Excerpt :Given that, we believe it is necessary to encourage the rapid development of steganalysis schemes that detect the presence of steganography in popular mediums for the exchange of steganographic content. It is important to highlight that some of the surveyed steganography methods [39,36,42,45,44,46,57,62,64,68,25,27,95] fail to report the effectiveness of their proposed schemes at evading detection by steganalysis systems and instead solely utilize metrics such as the PSNR which are meant for measuring the invisibility of the proposed scheme. Unfortunately, this prevents the research community from examining the effectiveness of the proposed method at evading detection by steganalyzers, which is the primary goal of any steganography scheme.
Robust coverless steganography using limited mapping images
2022, Journal of King Saud University - Computer and Information SciencesAlgorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions
2021, Signal ProcessingCitation Excerpt :Table 3 demonstrates that the algorithm [20] has a greater embedding capacity; however, this value was obtained for color images. The maximum embedding capacity that our algorithm is capable of providing when working with color images with the resolution of 512 × 512 pixels is about 300,000 bits, which is greater than the capacity of the algorithm [20]. In terms of error-free embedding, only the algorithm [28] competes with our algorithm.
Dynamic 8 Bit Xor Algorithm With Aes Crypto Algorithm for Image Steganography
2024, Research SquareConstructive Data Hiding Based on Texture Synthesis and Recognition with Image Style Transfer
2023, Ruan Jian Xue Bao/Journal of SoftwareGenetic algorithm and hamilton path based data hiding scheme including embedding cost optimization
2023, Multimedia Tools and Applications