ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images

Similar documents
A Reversible Data Hiding Scheme for BTC- Compressed Images

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Steganography by using Logistic Map Function and Cellular Automata

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Reversible Data Hiding Based on Median Difference Histogram

On the Selection of Image Compression Algorithms

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

A reversible data hiding based on adaptive prediction technique and histogram shifting

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

Image Steganography (cont.)

On the Selection of Image Compression Algorithms

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Data Hiding on Text Using Big-5 Code

Texture Analysis and Applications

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Image Steganography Method Using Integer Wavelet Transform

A Framework to Reversible Data Hiding Using Histogram-Modification

Analysis of Information Hiding Techniques in HEVC.

Robust Steganography Using Texture Synthesis

Efficient & Secure Data Hiding Using Secret Reference Matrix

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Random Image Embedded in Videos using LSB Insertion Algorithm

Appendix A. Definition of Terms

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS

Adaptive Pixel Pair Matching Technique for Data Embedding

International Journal of Computer Engineering and Applications,

A New Approach to Compressed Image Steganography Using Wavelet Transform

High Capacity Data Hiding Scheme for DCT-based Images

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Implementation of Random Byte Hiding algorithm in Video Steganography

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Improved Qualitative Color Image Steganography Based on DWT

Enhancing the Image Compression Rate Using Steganography

Detecting Hidden Information in Images: A Comparative Study

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

Multilayer Data Embedding Using Reduced Difference Expansion

A Novel Information Security Scheme using Cryptic Steganography

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

Speech Modulation for Image Watermarking

Digital Image Steganography Using Bit Flipping

Image Error Concealment Based on Watermarking

Jeff Hinson CS525, Spring 2010

A Formula Diamond Encoding Data Hiding Scheme

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform

Breaking the OutGuess

Robust DWT Based Technique for Digital Watermarking

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Dr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

FPGA IMPLEMENTATION FOR REAL TIME SOBEL EDGE DETECTOR BLOCK USING 3-LINE BUFFERS

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

MRF Based LSB Steganalysis: A New Measure of Steganography Capacity

Block-DCT Based Secret Image Sharing over GF(2 8 )

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Digital image steganography using LSB substitution, PVD, and EMD

Multibit Embedding Algorithm for Steganography of Palette-Based Images

A Robust Watermarking Algorithm For JPEG Images

Information Cloaking Technique with Tree Based Similarity

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

Steganography. Brent McClain Rob Carey

Topics. Number Theory Review. Public Key Cryptography

A New hybrid method in watermarking using DCT and AES

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

A HYBRID DPCM-DCT AND RLE CODING FOR SATELLITE IMAGE COMPRESSION

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Analysis of Reversible Data Hiding Technique In Encrypted Domain

A Methodology to Detect Most Effective Compression Technique Based on Time Complexity Cloud Migration for High Image Data Load

Extended Adaptive Pixel Pair Matching

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Data Hiding in Audio-Video using Anti Forensics Technique for Secret Message and Data in MP4 Container

DATA- FILE SECURITY ENCRYPTION ALGORITHM

Interactive Progressive Encoding System For Transmission of Complex Images

Robust Lossless Data Hiding. Outline

Robust Image Watermarking based on DCT-DWT- SVD Method

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

Efficient Image Steganography Using Integer Wavelet Transform

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Alpha-trimmed Image Estimation for JPEG Steganography Detection

Secret Video Data Hiding with Images Embedding Using Media Data Chunking and Embedding Algorithms

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Transcription:

ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw Abstract Steganography [6][13] refers to embedding information or secret message into media. This paper presents a simple and secure high-capacity steganographic algorithm for information hiding [15]. We synthesize a cover-image texture with four gray levels 32, 96, 160, and 224 of user-selected size based on a Markov Random Field (MRF) model [3]. On the other hand, each byte of the secret information (secret message, image, etc.) is first encrypted based on an exponential modular arithmetic which is then partitioned into two 4-bit words. Each 4-bit word represented as an integer value in [0, 15] is inserted into a pixel in the selected cover-image to form a stego-image. The embedding capacity for an m by n cover-image could be as high as (m n)/2, an experiment is illustrated for the proposed methodology. Keyword: Cover-Image, Encryption, Markov Random Field, Stego-Image. 1. Introduction Internet has become the most popular way for communication and information broadcast. Most of the Internet users either satisfy or ignore the current security and privacy of communication over network transmission until their information is stolen or misused [6]. Thus motivated, data hiding [5][13] plays an important role recently. On the other hand, the cost of storage space is significantly dropped and the bandwidth of network is good enough to transmit an image that recalls the adoption of an ancient methodology, steganography, to serve as an act of covert communication. Despite Steganography using JPEG compressed images based on the discrete cosine transform (DCT) were widely studied in the past decade [10][12][9] [7], this paper provides a simple, secure, and reversible data hiding system [8] based on the flowchart given in Figure 1. This novel steganographic framework has two distinct properties: (1) the secret message, for example, personal ID, bank account numbers, private letters are first encrypted by using simple algorithms like Hill ciphers or random permutations [11]. The goal is to raise the security level, (2) the cover-image 237

is chosen from artificial microarray image templates [4] or texture images synthesized from Markov random fields. The advantage is that we can easily generate these cover images to fit the various sizes of secret messages. This report describes an embedding program and an extraction program for steganography including an Ising Markov random field image synthesizer, a random permutation based on Number Theory, in addition to least significant bit replacement (LSB) [1][2]. Cover Image Selection Secret Bitstream Bitstream Stego-Image Message Conversion Embedding Figure 1. A Flowchart of Proposed Steganography. 2. Cover Images Generated by Markov Random Fields Using Markov Random Field (MRF) Models to synthesize textures is a challenging task. We will review MRF and give algorithms for synthesizing textures [3]. 2.1 Background of Markov Random Field Let x, an M N texture pattern, be represented as a matrix whose elements take values from the set. Let, be the set of all possible texture patterns, and let be the sites of a matrix ordered by a raster scan. A Gibbs random field (GRF) is a joint probability mass function defined on which satisfies (1) where U(x) is the energy function and is the partition function. A Markov random field is a Gibbs random field whose probability mass function. satisfies the following conditions. (a) Positivity: for all. (b) Markov Property: where is the ordered set of neighbors of site t. (c) Homogeneity: does not depend on a particular site t. 238

Figure 2 defines the relative sites and orders of neighbors of site t. A GRF and an MRF are equivalent [3] with respect to a specified neighborhood system. t:-3 t:-2 t:+4 2 1 2 t:-1 t t:+1 1 t 1 t:-4 t:+2 t:+3 2 1 2 Figure 2. The relative sites and orders of neighbors of site t. A Gibbs random field is completely characterized by its energy function. In this paper, a commonly used MRF model whose energy function has the following form is introduced: (2) where H(a, b) = H(b, a) and c depends on the size of the neighborhood. For example, c = 2, 4 for 1storder and 2nd-order neighborhoods, respectively. The generalized Ising MRF model (GIM) is defined below [3] 2.1.1 Generalized Ising Model (GIM) Let A = {0, 1,..., G 1}; the F and H functions of (2) in the generalized Ising model are defined as and H(xt, xt:+r)= θr I(xt, xt:+r), where I(a, b) = 1 if a = b and I(a, b) = 1, otherwise. Simple derivation gives the conditional density: (3) An algorithm for simulating the generalized Ising model (GIM) is given below [3]. Two 128 128 synthesized image textures obtained based on GIM with the parameters θ = (1, 1, 1, 1) and θ = (2, 2, 1, 1) are shown in Figures 3(a) and 3(b), respectively. Algorithm Generalized Ising Algorithm [GIM] (1) For s=1 to MN, randomly assign a to each to give an initial image. (2) For s=1 to MN Do 239

(a) Let for all Choose at random and let. (b) Let, where P is as defined in eq. (1). (c) x y with probability r. (3) Repeat step (2) until convergence, is achieved, for example, in 50 iterations. Each of the four parameters of the 2nd-order GIM model is restricted to be between -2 and 2 to avoid the phase-transition phenomenon [3]. In practice, this model assumes that a texture will consist of a small number of gray levels, for example, 8 or less. Each parameter determines a directionality; the larger the negative value of the parameter, the stronger the direction. (a) (b) Figure 3. Images with (a) θ=(1,1,1,-1), (b) θ=(2,2,-1,-1). 3. Data Encryption and Character Partition Suppose that a message consists of characters whose ASCII code is from 0 to 255, for example, h,i,d,e is represented as 104,105,100,101. We adopt the concept of a primitive root mod p=257 [11] as permutation on {0, 1,, 255} to map (encrypt) the message 104,105,100,101 into 159,172,217,103 character by character such as x y, for example, 104 159, 105 172, 100 217, 101 103, by the following modular computations (4) We then partition the 8-bit integer into 2 4-bit words to be embedded into two pixels, for example, 159 = 10011111 is splitted into 1001 and 1111. These two 4-bit words are sequentially embedded into the least significant bits of the corresponding pixels whose pixel values are designated as one of the four values {32, 96, 160, 224}. 4. Experimental Results There are 3 major modules (programs), embed1.c extract1.c, genising.c, required to implement this system. The result of embedding a famous article derived from the commencement speech to Stanford University students in 2005 given by Steve Jobs, the late CEO of Apple Inc. are given as follows. The article is given as a plaintext file 240

steve.txt which consists of 6646 characters in 25 lines and 1094 words. The result of this article is embedded into a 128 128 cover-image rain128.raw to get a 128 128 stego-image stego2.raw. The cover-image rain128.raw and stego-image stego2.raw with the peak signal-to-noise ratio (PSNR) 30.08 shown below look visually quite the same. (a) (b) Figure 4. (a) Cover-image and (b) Stego-Image. 5. Conclusion and Discussion This paper proposes a simple and secure steganographic system based on Number Theory [11] and MRF-Synthesized cover images. Three major programs written in C language are used for this system: (1) genising.c with user-specified parameters is used to generate cover images; (2) embed1.c is used for embedding messages into a cover-image by a user-specified primitive root (mod p=257) to get a stego-image, and (3) extract1.c is used for recovering the hidden message from a stego-image. An experiment for embedding the message of steve.txt containing 6646 ASCII characters Into a 128 128 texture image is illustrated. The cover-image and the corresponding stego-image has the PSNR value 30.08 and visually look the same. This practical system can not only be used for embedding plaintext files but also be applied to embedding other file formats such as word, excel, pdf, and etc. 6. Acknowledgments This work is partially supported by Taiwanese grant NSC 101-2221-E-007-125-MY3. REFERENCES [1] Chan, C.K. and Cheng, L.M., Hiding Data In Images By Simple LSB Substitution, Pattern Recognition, vol. 37, 469-474, 2004. [2] Chang, F.J., A Steganographic Method Using MRF-Synthesized Textures as Cover Images, M.S. Thesis, National Tsing Hua University, Hsinchu Taiwan, April 2011. [3] Chen, C.C. and Chen, C.C., Texture Synthesis: A Review and Experiments, Journal of Information Science and Engineering, vol. 19, no. 2, 371-380, 2003. 241

[4] Chen, C.C., Kao, C.Y., Chang, C.F., Chu, H.T., and Chen, C.N., Simple Software for Microarray Image Analysis, IEEE Proceedings of Computer and Robot Vision, Pid163, Quebec City, Canada, 2006. [5] Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., and Kalker, T., Digital Watermarking and Steganography, Morgan and Kaufmann, 2008. [6] Johnson, N.F. and Jajodia, S., Exploring Steganography: Seeing the Unseen, IEEE Computer Magazine, vol. 31, no. 2, 26-34, 1998. [7] Liu, C.L. and Liao, S.R., High-Performance JPEG Steganography Using Complementary Embedding Strategy, Pattern Recognition, vol. 41, 2945-2955, 2008. [8] Ni, Z., Shi, Y.Q., Ansari, N., and Su, W., Reversible Data Hiding, IEEE Transactions on Circuit and Systems for Video Technology, vol. 16, no. 3, 354-362, 2006. [9] Provos, N. and Homeyman, P., Hide and Seek: An Introduction to Steganography, IEEE Security & Provacy, vol. 1, no. 3, 32-44, 2003. [10] Pennebaker, W.B., Mitchell J., JPEG Still Image Compression Standard, New York: Van Nostrand Reinhold, 1993. [11] Stinson, D.R., Cryptography Theory and Practice, 3rd ed., Chapman & Hall/CRC, 2006. [12] Westfeld, A., F5 A Steganographic Algorithm: High Capacity Despite Better Steganalysis, International Workshop on Information Hiding, Berlin, vol. 2137, 289-302, 2001. [13] http://en.wikipedia.org/wiki/steganography, last access on January 16, 2014. [14] http://www.cs.nthu.edu.tw/ cchen/steve.txt, last access on January 16, 2014. [15] Lai, W.J., A High-Capacity Steganographic System Using MRF-Based Texture Synthesis, M.S. Thesis, National Tsing Hua University, Hsinchu, Taiwan, March 2013. 242