Secure Image Steganography with High Visual Image Quality Based on LSBM and Genetic Algorithm

Document Type : Persian Original Article

Authors

1 Department of Computer, Faculty of Engineering, Alzahra University, Tehran, Iran

2 Department of Engineering and Technology, Alzahra University, Tehran, Iran

Abstract

Abstract- The LSB matching method or LSBM is one of the simplest methods of steganography that has been proposed relatively successful attacks for its discovery. Visual image quality (imperceptibility) and lack of discovery by steganalysis attacks are two important criteria for any method of steganography. The main purpose of this paper is to provide a LSBM-based approach that is superior to LSBM in these two criteria. In the proposed method, the cover image is blocked and selected the best embedding sequence for each block using the genetic algorithm and the Linear Congruential Generator (LCG). The best sequence contains pixels whose LSB correspond most to data bits. The second step is to use the LSBM in the pixels of this embedding sequence. If the secret bit does not match the pixel’s LSB, the pixel value should be incremented or decremented randomly by one unit. To make these random selections, a genetic algorithm has been used, so that the block has the least change in histogram compared to the original block. Comparing the parameter of visual image quality and the accuracy of the attacks in discovering this method, indicates the proper improvement of these criteria compared to the LSBM method.

Keywords


[1] J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and trends in Future Research,” Neurocomputing, Vol. 335, pp. 299-326, 2019.
[2]    M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, “Image Steganography in Spatial Domain: A Survey,” Signal Processing: Image Communication, Vol. 65, pp.46-66, 2018.
[3]  Y.J. Chanu, T. Tuithung and K.M. Singh, “A Short Survey on Image Steganography and Steganalysis Techniques”.  In 3rd National Conference on Emerging Trends and Applications in Computer Science, IEEE, pp. 52-55, 2012.
[4]  V. Sabeti, S. Samavi, M. Mahdavi and S. Shirani, “Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks,” Pattern Recognition, Vol. 43, No. 1, pp. 405-415, 2010.
[5]   M.S. Subhedar and H.M. Vijay, “Current Status and Key Issues in Image Steganography: A Survey,” Computer Science Review, Vol. 13, pp. 95-113, 2014.
[6]  D.C. Wu and W.H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003.
[7] X. Zhang and S. Wang, “Vulnerability of Pixel-Value Differencing Steganography to Histogram analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, No. 3, pp. 331-339, 2004.
[8] H.C. Wu, N.I. Wu, C.S. Tsai and M.S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.
[9]  C.M. Wang, N.I. Wu, C.S. Tsai and M.S. Hwang, “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,” The Journal of Systems and Software, Vol. 81, No. 1, pp. 150-158, 2008.
[10] C.C. Chang and H.W. Tseng, ”A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letter, Vol.25, No.12,  pp. 1431-1437, 2004.
[11] P. Chen and W. Wu, “A Modified Side Match Scheme for Image Steganography,” International Journal of Applied Science and Engineering, Vol. 7, No. 1, pp. 53-60, 2009.
[12] M. Hossain, S.A. Haque and F. Sharmin, “Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information,” The International Arab Journal of Information Technology, Vol. 7, No. 1, pp. 34-38, 2010.
[13] م. مهدوی، "پنهان‌شکنی کمّی روش جایگزینی بیت کم‌ارزش مبتنی بر تحلیل هیستوگرام"، رساله دکترا، دانشکده برق و کامپیوتر، دانشگاه صنعتی اصفهان 1390.
[14] C.K. Chan and L.M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469–474, 2004.
[15] م. مهدوی، ش. سماوی، م. اخوت و ص. اکرمی، "روش پنهان‌نگاری تطبیقی بر اساس اغتشاش جمع شونده،" پانزدهمین کنفرانس مهندسی برق ایران، اردیبهشت 1386.
[16] C. Liu, X. Li, X. Lu and B. Yang, “A Content-Adaptive Approach for Reducing Embedding Impact in Steganography,” Proc. of the IEEE ICIP, pp. 1762-1765, 2009.
[17] A. Westfeld, “Detecting Low Embedding Rates”. In Information Hiding, 5th International Workshop, LNCS, Vol. 2578, pp. 324-339, 2002.
[18] J.J. Harmsen and W.A. Pearlman, “Steganalysis of Additive Noise Modelable Information Hiding,” Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, Vol. 5020, pp. 131-142, 2003.
[19] A. Ker, “Steganalysis of LSB Matching in Grayscale Images,” IEEE Signal Processing Letters, Vol. 12, No. 6, pp. 441–444, 2005.
[20] A. Ker, “Resampling and the Detection of LSB Matching in Color Bitmaps,” In Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE, Vol. 5681, pp. 1-15, 2005.
[21] J. Zhang, I.J. Cox and G. Doerr, “Steganalysis for LSB Matching in Images with High-Frequency Noise,” Proceedings of the IEEE Workshop on Multimedia Signal Processing, pp. 385–388.
[22] G. Cancelli, I.J. Cox and G. Doerr, “Improved LSB Matching Steganalysis Based on the Amplitude of Local Extrema”. in IEEE International Conference on Image Processing, 2008.
[23] F. Huang, B. Li and J. Huang, “Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.” Proceedings of the IEEE ICIP, Vol. 1, pp. 401–404, 2007.
[24] M. Goljan, J. Fridrich and T. Holotyak,  “New Blind Steganalysis and its Implications”. in Security, Steganography, and Watermarking of Multimedia Contents VIII, Proceedings of SPIE, Vol. 6072, pp. 1-13, 2006.
[25] G. Cancelli, G. Doerr, I.J. Cox and M. Barni “A Comparative Study of +1 Steganalyzers”. In IEEE Int. Workshop on Multimedia Signal Processing, IEEE Workshop on Multimedia Signal Processing (MMSP), 2008.
[26] Z. Xia, X. Wang, X. Sun, Q. Liu and N. Xiong, “Steganalysis of LSB Matching Using Differences Between Nonadjacent Pixels,” Multimedia Tools and Applications, Vol. 75, No. 4, pp.1947-1962, 2016.
[27] L.Y. Tseng, Y.K. Chan, Y.A. Ho and Y.P. Chu, “Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process”. In IEEE Eighth International Conference on Intelligent Systems Design and Applications, Vol. 3, pp. 320-325, 2008.
[28] M. Khodaei and K. Faez, “Image Hiding by Using Genetic Algorithm and LSB Substitution”. In International Conference on Image and Signal Processing, pp. 404-411, 2010.
[29] A. Khamrui, D.D. Gupta, S. Ghosh and S. Nandy, “A Spatial Domain Image Authentication Technique Using Genetic Algorithm”. In International Conference on Computational Intelligence, Communications, and Business Analytics, pp. 577-584, Springer, 2017.‏
[30] S. Khan and B. Tiziano, “Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 1, pp. 379-389, 2018.
[31] P.D. Shah and R.S. Bichkar, “A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator”. In International Conference on Intelligent Computing and Applications, Springer, Vol. 632, pp. 119-129, 2018.
[32] R. Wazirali, W. Alasmary, M.M. Mahmoud and A. Alhindi, “An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms,” IEEE Access, Vol. 7, pp. 133496-133508., 2019.
[33] P.D. Shah and R.S. Bichkar, “Genetic Algorithm Based Imperceptible Spatial Domain Image Steganography Technique with High Payload Capacity,” International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, No. 5, 2019.
 
[34] و. ثابتی، س. س. فیاضی، ح. شیرین خواه، " بهبود امنیت روش پنهان‌نگاری LSBM با استفاده از الگوریتم ژنتیک، چند کلیدی و بلاک بندی"، نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 18، شماره 1، ص. 49-58، بهار 99.