Adaptive Image Steganography in the Difference Value of Discrete Cosine Transform Coefficients

Document Type : Persian Original Article

Authors

1 Department of Computer, Faculty of Engineering, Alzahra University, Tehran, Iran

2 Department of Computer, Faculty of Engineering, Malayer University, Malayer, Iran

Abstract

Steganography is the science and art to conceal the existence of communication, by hiding information in a digital media, the existence of communication is hidden from the enemy's point of view. steganography in the frequency transform coefficients and in particular the discrete cosine transform (DCT), due to its low detection capability, is one of the most common and active areas of steganography among researchers. But most of the methods in this area have used embedding directly in the DCT coefficients. The main purpose of the proposed method in this paper is to suggest a different embedding platform in this field. In the proposed embedding method, the DCT transformation coefficients are coupled and embedding is on the difference value of each couple. The embedding is done in such a way that the receiver can extract the data completely by calculating the difference in the value of the neighboring pairs. The proposed method is an adaptive method because the number of embedded bits in each pair of coefficients is dependent on the difference between them. The results of various experiments show that the proposed method, with the preservation of the quality of the stego image at a desirable level and having a reasonable embedding capacity, is less likely to be detected in relation to the existing steganalysis attacks.

Keywords


  [1]     I.J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research,” Neurocomputing, Vol. 335, pp. 299-326, 2019.
  [2]     M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, “Image Steganography in Spatial Domain: A Survey,” Signal Processing: Image Communication, Vol. 65, pp. 46-66, 2018.
  [3]     V. Sabeti, S. Samavi and S. Shirani, “An Adaptive LSB Matching Steganography Based on Octonary Complexity Measure,” Multimedia Tools and Applications, Vol. 64, No. 3, pp.777-793, 2013.
  [4]     S. Bhattacharyya, A. Khan and G. Sanyal, “DCT Difference Modulation (DCTDM) Image Steganography,” International Journal of Information & Network Security, Vol. 3, No. 1, pp. 40 – 63, 2014.
  [5]     A. Fkirin, G. Attiya and A. El-Sayed, “Steganography Literature Survey, Classification and Comparative Study,” Communications on Applied Electronics, Vol. 5, No. 10, 2016.
  [6]     J. Jeswani and D.T. Sarode, “A New DCT based Color Video Watermarking using Luminance Component,” IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16, No. 2, pp. 83–90, 2014.
  [7]     M. Kharrazi, H.T. Sencar and N. Memon, “Image Steganography: Concepts and Practice,” Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore, 2004.
  [8]     N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, pp. 32-44, 2003.
  [9]     N. Provos, “Defending Against Statistical Steganalysis”. In Usenix security symposium, Vol. 10, pp. 323-336, 2001.
[10]     A. Westfeld, “F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis”. In Information Hiding: 4th International Workshop, Vol. 2137, pp. 289, 2001.
[11]     J. Fridrich, M. Goljan and D. Hogea, “Attacking the OutGuess”. In Proceedings of the ACM Workshop on Multimedia and Security, Vol. 2002, 2002.
[12]     J. Fridrich, M. Goljan and D. Holga, “Steganalysis of JPEG Images: Breaking the F5 Algorithm”. In International Workshop on Information Hiding, pp. 310-323, 2003.
[13]     A.A. Attaby, F.M. Mona, M. Ahmed and A. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3,” Ain Shams Engineering Journal, 2017.
[14]     T. Filler, J. Judas and J. Fridrich, “Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 920-935, 2011.
[15]     Y. Pan, J. Ni and W. Su, “Improved Uniform Embedding for Efficient JPEG Steganography”. In International Conference on Cloud Computing and Security, pp. 125-133, 2016.
[16]     Q. Wei, Z. Yin, Z. Wang and X. Zhang, “Distortion Function Based on Residual Blocks for JPEG Steganography,” Multimedia Tools and Applications, Vol. 77, No. 14, pp. 17875-17888, 2018.
[17]     D.C. Wu and W.H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613–1626, 2003.
[18]     L. Yu, Y. Zhao, R. Ni and Z. Zhu, “PM1 Steganography in JPEG Images Using Genetic Algorithm,” Soft Computing, Vol. 13, No. 4, pp. 393–400, 2009.
[19]     D. Bansal and R. Chhikara, “An Improved DCT Based Steganography Technique,” International Journal of Computer Applications, Vol. 102, No. 14, 2014.
[20]     T. Rabie and I. Kamel, “High-Capacity Steganography: A Global-Adaptive-Region Discrete Cosine Transform Approach,” Multimedia Tools and Applications, Vol. 76, No. 5, pp. 6473-6493, 2017.
[21]     A.S. Ansari, M.S. Mohammadi, and M.T. Parvez, “JPEG Image Steganography based on Coefficients Selection and Partition,” International Journal of Image, Graphics & Signal Processing, Vol. 9, No.6, pp. 14-22, 2017.
[22]     S. Khan, M.A. Irfan, A. Arif, S.T.H. Rizvi, A. Gul, M. Naeem and N. Ahmad, “On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography,” CMES-Computer Modeling in Engineering & Sciences, Vol. 118, No. 3, pp. 529-546, 2019.
[23]     E.H. Rachmawanto and C.A. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” Journal of Applied Intelligent System,Vol. 2, No. 1, pp. 1-11, 2017.
[24]     Y.K. Singh and S. Sharma, “Image Steganography on Gray and Color Image Using DCT Enhancement and RSA with LSB Method”. In International Conference on Inventive Computation Technologies (ICICT), Vol. 3, pp. 1-5, 2016.
[25]     D. Hou, H. Wang, W. Zhang and N. Yu, “Reversible Data Hiding in JPEG Image Based on DCT Frequency and Block Selection,” Signal Processing, Vol. 148, pp.41-47, 2018.
[26]     F. Huang, X. Qu, H.J. Kim and J. Huang, “Reversible Data Hiding in JPEG Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol.  26, No. 9, pp. 1610-1621, 2015.
[27]     T. Pevny, P. Bas and J. Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, 2010.