ABSTRACT
Various researches in image steganography focusing on spatial domain specifically in the least Significant Bit (LSB) embedding method had been conducted to improve the embedding capacity while maintaining high imperceptibility. However, these improvements were countered by various statistical attacks. This paper presents an LSB-based image steganography technique that uses YCbCr color space for the embedding process. Also, a new cover selection method to strengthen the proposed embedding algorithm was introduced in this paper. The cover selection mechanism used the skewness and kurtosis of the candidate cover images as factors to determine if a candidate cover image will yield to a high probability of detection or not. The distortions analysis affirms that the stego-images produced by the embedding method obtained acceptable PSNRs and SSIMs, thus, proving that the stego-images are resistant to Human Visual System. Also, the embedding method presented in this paper produced stego-images that were given a low probability of detection of various statistical analysis attacks. Furthermore, the high correlation coefficient between the candidate cover images' skewness and kurtosis and the probability of detection obtained by the stego-images affirms that these properties of the candidate cover images can help in determining the most suitable candidate cover images to be used.
- Global digital population 2018 | Statistic: 2018. https://www.statista.com/statistics/617136/digital-population-worldwide/. Accessed: 2018-11-30.Google Scholar
- World Internet Users Statistics and 2018 World Population Stats: 2018. https://www.internetworldstats.com/stats.htm. Accessed: 2018-11-30.Google Scholar
- Kim, K. 2016. Cryptography: A New Open Access Journal. Cryptography. 1, 1 (2016), 1.Google Scholar
- Seth, D. et al. 2010. Security Enhancement: Combining Cryptography and Steganography. International Journals of Computer Applications. 9, 11 (2010), 9--12.Google Scholar
- Parihar, A. and Saxena, A. 2017. Survey on Digital data hiding using Steganography. International Journal of Recent Trends in Engineering and Research. (2017), 237--244.Google Scholar
- Rote, G.D. and Patil, A.M. 2014. A Novel Approaches Towards Steganography. International Journal of Technical Research and Application. 2, 4 (2014), 72--75.Google Scholar
- Roy, R. et al. 2013. Evaluating image steganography techniques: Future research Challenges. 2013 International Conference on Computing, Management and Telecommunications, ComManTel 2013. (2013), 309--314.Google Scholar
- Li, B. et al. 2011. A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing. 2, 2 (2011), 142--172.Google Scholar
- Subhedar, M.S. and Mankar, V.H. 2014. Current status and key issues in image steganography: A survey. Computer Science Review. 13--14, C (2014), 95--113. Google ScholarDigital Library
- Chan, C.K. and Cheng, L.M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition. 37, 3 (2004), 469--474.Google ScholarCross Ref
- Sun, Y. and Liu, F. 2010. Selecting Cover for Image Steganography by Correlation Coefficient. (2010), 159--162.Google Scholar
- Abbadi, N.K. El 2013. Cover Optimization for Image in Image Steganography. IJCSI International Journal of Computer Science Issues. 10, 1 (2013), 556--564.Google Scholar
- Subhedar, M.S. and Mankar, V.H. 2017. Curvelet transform and cover selection for secure steganography. Multimed Tools Appl. (2017). Google ScholarDigital Library
- Jegou, H. et al. 2008. Hamming Embedding and Weak Geometry Consistency for Large Scale Image Search - Extended version -. Eccv. 5302, October (2008), 304--317. Google ScholarDigital Library
- Wang, Z. et al. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing. 13, 4 (2004), 600--612. Google ScholarDigital Library
- Fridrich, J. et al. 2001. Detecting LSB Steganography in Color and Gray-Scale Images. IEEE Multimedia and Security. 8, 4 (2001), 22--28. Google ScholarDigital Library
- Dumitrescu, S. et al. 2003. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing. 51, 7 (2003), 1995--2007. Google ScholarDigital Library
- Westfeld, A. and Pfitzmann, A. 2000. Attacks on steganographic Systems. Information Hiding. 1768, (2000), 1--16. Google ScholarDigital Library
Index Terms
- Cover Image Selection Technique for Secured LSB-based Image Steganography
Recommendations
Secured Data Hiding and Sharing using Improved LSB-based Image Steganography Technique
ICIBE '18: Proceedings of the 4th International Conference on Industrial and Business EngineeringDespite the notable performance of various existing image steganography techniques in the spatial domain, various statistical analyses such as Chi-square and RS analysis still considerably affect their over-all performance. Also, employing conventional ...
Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching
CompSysTech '17: Proceedings of the 18th International Conference on Computer Systems and TechnologiesThe main objective of this research paper is to suggest a new steganography method based on a LSB insertion method and contrast stretching image histogram modification. The stego-images, obtained using the proposed data hiding method, are robust to RS ...
A Novel Approach for Image Steganography based on LSB Technique
ICCDA '17: Proceedings of the International Conference on Compute and Data AnalysisSteganography involves communicating secret data in an appropriate digital carrier, e.g., image, audio, and video files. We focus on image based steganography in this paper. A novel approach based on LSB technique for embedding text data i.e. secret ...
Comments