2

Similar documents
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A New Approach to Compressed Image Steganography Using Wavelet Transform

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

An Improved Performance of Watermarking In DWT Domain Using SVD

A new robust watermarking scheme based on PDE decomposition *

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform

Digital image steganography using LSB substitution, PVD, and EMD

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Digital Image Steganography Using Bit Flipping

Improved Qualitative Color Image Steganography Based on DWT

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Reversible Steganographic Technique Based on IWT for Enhanced Security

Image Steganography (cont.)

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

A Novel Information Security Scheme using Cryptic Steganography

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding

Audio Data Hiding Based on Sample Value Modification Using Modulus Function

A Secure Steganography Technique using DCT and Modified RC4

A Formula Diamond Encoding Data Hiding Scheme

A Digital Video Watermarking Algorithm Based on LSB and DCT

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

Random Image Embedded in Videos using LSB Insertion Algorithm

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

A Reversible Data Hiding Scheme for BTC- Compressed Images

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Data Hiding on Text Using Big-5 Code

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Robust DWT Based Technique for Digital Watermarking

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Enhancing the Image Compression Rate Using Steganography

Feature Based Watermarking Algorithm by Adopting Arnold Transform

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

CHAPTER-5 WATERMARKING OF COLOR IMAGES

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

Breaking the OutGuess

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Jeff Hinson CS525, Spring 2010

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Invisible Watermarking Audio Digital with Discrete Cosine Transform

Novel Content Independent Steganographic Method for Microsoft Office

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

QR-Code Image Steganography

A DWT Based Steganography Approach

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Data Hiding in Video

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

International Journal of Computer Engineering and Applications,

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Efficient Image Steganography Using Integer Wavelet Transform

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Reversible Data Hiding in Colour Images using AES Data Encryption System

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

QR Code Watermarking Algorithm based on Wavelet Transform

A secure steganographic algorithm based on Cellular Automata using Fibonacci representation

Dr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

A Framework to Reversible Data Hiding Using Histogram-Modification

A reversible data hiding based on adaptive prediction technique and histogram shifting

Reversible Data Hiding VIA Optimal Code for Image

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Appendix A. Definition of Terms

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Adaptive Pixel Pair Matching Technique for Data Embedding

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A SECURE STEGANOGRAPHY APPROACH OF MULTIPLE SECRET IMAGES USING ANN

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Multiple Binary Images Watermarking in Spatial and Frequency Domains

Transcription:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

2018 International Conference on Information and Communications Technology (ICOIACT) An Improved Message Capacity and Security using Divide and Modulus Function in Spatial Domain Steganography De Rosal Ignatius Moses Setiadi, Heru Agus Santoso, Eko Hari Rachmawanto, Christy Atika Sari Department of Informatics Engineering, Computer Science Faculty Dian Nuswantoro University Semarang, Indonesia Email: moses@dsn.dinus.ac.id; heru.agus.santoso@dsn.dinus.ac.id; eko.hari@dsn.dinus.ac.id; atika.sari@dsn.dinus.ac.id Abstract Image Steganography is a technique for hiding messages into digital images, so messages cannot be perceived by the human senses. The two most important aspects of steganography techniques are the payload capacity and imperceptibility of embedded messages. This research proposes a method to explode secret messages using divide and modulus functions so that the message capacity embedded in a digital image can increase. The divide and modulus function can also improve message security because the messages are split into two part and sent separately. One part embedded and the other is stored as a key extraction. This method is done in a spatial domain. Spatial domains are steganographic techniques performed by manipulating pixel values directly. LSB is one of the most popular spatial domains proposed in this research. To measure the quality of imperceptibility are used PSNR and MSE. Based on the experimental results of this study proved that the capacity of embedded messages can increase twofold and keep maintaining the imperceptibility quality. Keywords Image Steganography, Modulus Function, Spatial Domain, LSB, Payload Capacity I. INTRODUCTION Steganography is one of the popular techniques for securing messages sent through the internet media. The Internet is a giant network that can be accessed by everyone in the world. This allows theft of messages to be sent. This is the main reason why the steganographic techniques must be developed [1]. Steganography is done by hiding the message in a container media or cover media. There are various covers that are used such as text, audio, image, and video [2]. The image is one of the steganography media are widely studied and will be discussed in this study. The digital imager is visual data that can be perceived by the human vision, then a good steganography on the image should not be perceived by the human eyes directly [3]. This is called the imperceptibility aspect, which is the most important aspect in determining the quality of the steganography method [4]. Imperceptibility is strongly influenced by the message capacity embedded in the cover. The greater the capacity of the embedded message then the quality of imperceptibility decreases. Therefore, many steganographic studies suggest ways to increase message capacity while maintaining imperceptibility. The Least Significant Bit (LSB), is a popular method in spatial domain steganography [5]. LSB is a steganography technique that makes the perceptual message invisible but has a simple computational complexity [6]. In several studies like [6], [7], [8], [9] LSB techniques combined with modulo functionality to improve message embedding capacity [10], and even increase resistance to statistical analysis and histogram. So in this study also proposed the use of the function of the modulus and division functions to optimize the algorithm to obtain a technique that has a larger payload, more secure and keep it simple in computational complexity. II. RELATED WORK Sun et al [8] integrate the LSB technique and the Exploiting Modification Direction (EMD) system with the goal of augmenting capacity and quality of stego imagery. The EMD system is modified by adding modulo functionality. The experimental results obtained on this method are significantly increased message capacity but there is a slight decrease in the quality of PSNR when compared to traditional EMD systems. Vijayalakshmi et al [6], combining the LSB method with module function and pseudo-random index generator with the key on RGB or grayscale image. Further testing is done statistical analysis and histogram. Statistical analysis is measured by Mean, Variance, RMS, and color difference in color images. Test results show this method does not change the value significantly and improve the security of hidden data. Nagaraj et al [7], also proposed a combination of LSB methods and modulo functions. The image tested in the method is an RGB image of 9067 bytes. While the inserted message measuring 1 kilobytes to 5 kilobytes. Further stego image is done statistic analysis and histogram. Based on experimental results showed no significant change in the value of statistics and histogram. It's just that the image looks blur when the message of 5 kilobytes pinned. This is quite reasonable because the message capacity is relatively large. Akhtar et al [9], also proposed a combination of LSB substitution methods and modulo functions. It's just modulo function used to compress messages. Before the message is embedded, the message is divided into two sections. 978-1-5386-0954-5/18/$31.00 2018 IEEE 186

2018 International Conference on Information and Communications Technology (ICOIACT) Furthermore, both components are embedded into the cover image using modulo function. The results of this study show that there is increased capacity and message security while maintaining imperceptibility quality of stego image. The quality of imperceptibility is measured by PSNR, where the resulting PSNR value range is 34-40dB. Based on previous research, this research proposed LSB combination and modulo function and division function to insert a secret message on the cover image. The secret message will be split into two parts with the division and modulus functions. One part is embedded and another part is sent as the extraction key. This is done for capacity building, security and stego image quality. III. A. Embedding Scheme Message Image PROPOSED METHOD Reshape to one dimension vector cover image. The second part is the mod data which is stored as the key of the extraction. (1) (2) Where: = div data =mod data =message in vector form 3. Convert the div data into binary form. 4. Read the cover image then change to binary form. 5. Embed the div data on the smallest bit of cover image. 6. Replace the cover image with the bit form to the pixel value, so we get the stego image. Note that the division and modulus functions both use constants 16. This number is chosen to divide a pixel value of 8 bits into two-valued data every 4 bits. B. Extracting Scheme LSB Extraction Divide and Mod Fuctions Stego Image Div data Cover Image Div data Save Mod data for Extraction Key Mod data (key) Reshape to size of message image Embed using LSB Joint formula Fig. 1. Proposed Embedding Scheme Stego Image The insertion scheme is one of two major steganographic processes. Figure 1 is the proposed insertion scheme. The following is a description of the insertion scheme based on Figure 1. 1. Read the message image then change it to a onedimensional vector form. 2. Perform the divide function and modulus on the vector of the message image in a loop. Use the formula (1) the divide and formula (2) function for the modulus function, so the message is divided into two parts. The first part is the div data which will be inserted into the Fig. 2. Proposed Extracting Scheme Recover Message Image Extraction scheme is a scheme to get back the embedded message on the cover image. Figure 2 describes the steps of the proposed extraction scheme. Here are the details of the steps shown in Figure 2. 1. Read stego image then do the LSB technique to get the data div. 2. Reshape div data into the size of the cover image. 3. Combine div data and mod data with join function with formula (3). (3) 187

2018 International Conference on Information and Communications Technology (ICOIACT) 4. Get the extraction of the message image. IV. EXPERIMENTAL RESULT AND ANALYSIS In this research used six standard cover image with size 256*256 as the cover image. The standard image is used to simplify the process of comparing with other studies as well as subsequent research. The cover image used is a grayscale type with three types of extensions: tiff, jpg, and bmp, cover image can be seen in figure 3. imperceptibility with PSNR and MSE. The stego image of the embedding can be seen in Figure 5. (a) (b) (a) (b) (c) (d) (c) (d) (e) (f) Fig. 5. Stego images{(a)clock.tiff, (b)couple.tiff, (c)cameraman.bmp, (d)chart.tiff, (e)goldhill.bmp, (f)livingroom.jpg} (e) Fig. 3. Cover images used {(a)clock.tiff, (b)couple.tiff, (c)cameraman.bmp, (d)chart.tiff, (e)goldhill.bmp, (f)livingroom.jpg} Fig. 4. Message image used (lena.bmp) The messages used in this study use grayscale image with size 128 * 128. Image of the message used can be seen in figure 4. This message can also be replaced text or other media with a size of 16384 bytes, or equivalent to 131072 bits. The message is then embedded in the cover image. The result of embedding is called stego image and then measured the quality of (f) The message embedded on the cover image is relatively large enough that 25% of the cover image. However, based on figure 5 it can be concluded that there is no significant change in pixel values visible to the human eye. Then PSNR and MSE are used to measure the quality of imperceptibility. The value of PSNR and MSE is obtained by comparing the cover image with stego image. The higher the PSNR value the better the quality, otherwise if the value of MSE is greater then the quality is getting down [11]. The quality of good PSNR is at least more than or equal to 40 db. Formula 4 is used to calculate the PSNR value while formula 5 is used to calculate the MSE value. (4) (5) Where :, is size of image; is cover image; 188

2018 International Conference on Information and Communications Technology (ICOIACT) is stego image. Table 1 below summarizes the results of calculations based on formula (4) and formula (5). TABLE I. IMPERCEPTIBILITY QUALITY BASED ON PSNR AND MSE Images MSE PSNR clock.tiff 0.2475 54.1948 couple.tiff 0.0597 60.3699 cameraman.bmp 0.2474 54.1967 chart.tiff 0.0333 62.9031 (a) Fig. 9. Histogram analisis of couple.tiff {(a) histogram of cover image, (b) histogram stego image) (b) goldhill.bmp 0.2430 54.2756 livingroom.jpg 0.1185 57.3953 Average 0.1582 57.2226 Based on table 1 can be seen that the value of PSNR quite varied, with a range of values 54.1948 db to 62.9031 db. Similarly, the value of MSE has a range of values 0.0597 to 0.2475. The results are shown in Table 1 indicate that the image quality of stego rated relatively excellent. (a) Fig. 10. Histogram analisis of goldhill.bmp {(a) histogram of cover image, (b) histogram stego image) (b) (a) Fig. 6. Histogram analisis of cameraman.bmp {(a) histogram of cover image, (b) histogram stego image) (a) Fig. 7. Histogram analisis of chart.tiff {(a) histogram of cover image, (b) histogram stego image) (a) Fig. 8. Histogram analisis of clock.tiff {(a) histogram of cover image, (b) histogram stego image) (b) (b) (b) (a) Fig. 11. Histogram analysis of livingroom.jpg {(a) histogram of cover image, (b) histogram stego image) Histogram analysis is also done to observe the number of pixel values that change. By observing carefully there is a slight difference on the histogram of the cover image and stego image, this is quite visible visually in figure 6, figure 8, figure 10. While in figure 7, figure 9, and figure 11 there is almost no difference in the histogram. The next test process is the measurement of message extraction results. Messages should be perfectly extracted so that the information sent is actually delivered. To measure the result of message extraction is used Correlation Coefficient (cc) by using formula (6). Based on the extraction test results obtained value 1 on all stego images, this proves the message extracted perfectly. (b) Where, is sum of pixels value of message image is original message image is extraction message image (6) 189

2018 International Conference on Information and Communications Technology (ICOIACT) V. CONCLUSION Based on the results of hypotheses and experiments that have been done in this study proved that the use of divide and modulus operations can increase the payload of messages by two-fold and message security also increased. This is because the embedded message will be divided into two parts with the divide and modulus functions. The two parts are data mod and div data, div data pinned and mod data are sent separately. The quality of imperceptibility is very satisfactory with an average PSNR value of 57.2226 db and an average value of MSE 0.1582. Messages can also be extracted perfectly, which has obtained a value of CC 1 for all stego images. REFERENCES [1] E. H. Rachmawanto, R. S. Amin, D. R. I. M. Setiadi dan C. A. Sari, A Performance Analysis StegoCrypt Algorithm based on LSB-AES 128 bit in Various Image Size, in International Seminar on Technology for Technology of Information and Communication (isemantic), Semarang, 2017. [2] K. Joshi, P. Dhankhar dan R. Yadav, A New Image Steganography Method in Spatial Domain Using XOR, in Annual IEEE India Conference (INDICON), New Delhi, 2015. [3] Z. Y. Al-Omari dan A. T. Al-Taani, Secure LSB Steganography for Colored Images using Character-Color Mapping, in International Conference on Information and Communication Systems (ICICS), Irbid, 2017. [4] M. Najih, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari dan S. Astuti, An Improved Secure Image Hiding Technique Using PN- Sequence Based On DCT-OTP, in International Conference on Informatics and Computational Sciences (ICICoS), Semarang, 2017. [5] C. Irawan, D. R. I. M. Setiadi, C. A. Sari dan E. H. Rachmawanto, Hiding and Securing Message on Edge Areas of Image using LSB Steganography and OTP Encryption, in International Conference on Informatics and Computational Sciences (ICICoS), Semarang, 2017. [6] V. Vijayalakshmi, G. Zayaraz dan V. Nagaraj, A Modulo Based LSB Steganography Method, in International Conference on Control, Automation, Communication, and Energy Conservation (INCACEC), Perundurai, 2009. [7] V. Nagaraj, V. Vijayalakshmi dan G. Zayaraz, Modulo Based Image Steganography Technique against Statistical and Histogram Analysis, International Journal of Computer Applications (IJCA), vol. 4, no. Network Security and Cryptography, pp. 34-39, 2011. [8] H.-M. Sun, C.-Y. Weng dan S.-J. Wang, A Scheme of Modulo-Based Capacity-improvement upon EMD Systems, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP), Kyoto, 2009. [9] N. Akhtar, V. Ahamad dan H. Javed, A Compressed LSB Steganography Method, in International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2017. [10] M. Sabokdast dan M. Mohammadi, A Steganographic Method for Images with Modulus Function and Modified LSB Replacement based on PVD, in Conference on Information and Knowledge Technology (IKT), Shiraz, 2013. [11] A. Winarno, D. R. I. M. Setiadi, A. A. Arrasyid, C. A. Sari dan E. H. Rachmawanto, Image Watermarking using Low Wavelet Subband based on 8 8 Sub-block DCT, in International Seminar on Application for Technology of Information and Communication (isemantic), Semarang, 2017. 190