•  
  •  
 

Abstract

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random numbers which are to be used as indices of pixels of the cover image are obtained from chaotic maps and data hiding process is applied on the values of these pixels by using modulo function. Calculated values are embedded in cover image as hidden data. Success of the proposed data hiding scheme is assessed by Peak Signal-to-Noise Ratio (PSNR), payload capacity and quality.

References

[1] Celik, M. U., Sharma, G., Saber, E., & Tekalp, A. M. (2002). Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing, 11(6), 585-595.

[2] Warkentin, M., Bekkering, E., & Schmidt, M. B. (2008). Steganography: Forensic, security, and legal issues. The Journal of Digital Forensics, Security and Law: JDFSL, 3(2), 17.

[3] Doğan, Ş. (2016). A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review, 46(1), 129-143.

[4] Sutherland, I., Davies, G., Pringle, N., & Blyth, A. (2009). The impact of hard disk firmware steganography on computer forensics. The Journal of Digital Forensics, Security and Law: JDFSL, 4(2), 73.

[5] Wang, X., Ding, J., & Pei, Q. (2015). A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Information sciences, 310, 16-35.

[6] Dogan, S. (2017). A reversible data hiding scheme based on graph neighbourhood degree. Journal of Experimental & Theoretical Artificial Intelligence, 29(4), 741-753.

[7] Kulkarni, A., Goldman, J., Nabholz, B., & Eyre, W. (2009). Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers. Journal of Digital Forensics, Security and Law, 4(2), 5-26.

[8] Ou, D., Sun, W., & Wu, X. (2015). Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Processing, 108, 604-621.

[9] Lai, H., Xiao, J., Li, L., & Yang, Y. (2012). Recursive hiding of biometrics-based secret sharing scheme using adversary structure. Information Processing Letters, 112(17), 683-687.

[10] Tuncer, T. (2017). A novel image authentication method based on singular value decomposition. Journal of the Faculty of Engineering and Architecture of Gazi University, 32(3), 877-886.

[11] Ahmed, A. M., & Day, D. D. (2004). Applications of the naturalness preserving transform to image watermarking and data hiding. Digital Signal Processing, 14(6), 531-549.

[12] Faircloth, J. (2014). Chapter 5 – Information Security, Enterprise Applications Administration, 175-220.

[13] Vaishnavi, D., & Subashini, T. S. (2015). Robust and invisible image watermarking in RGB color space using SVD. Procedia Computer Science, 46, 1770-1777.

[14] Chang, C. C., Tai, W. L., & Lin, C. C. (2006). A reversible data hiding scheme based on side match vector quantization. IEEE Transactions on Circuits and Systems for Video Technology, 16(10), 1301-1308.

[15] Lin, Y. K. (2014). A data hiding scheme based upon DCT coefficient modification. Computer Standards & Interfaces, 36(5), 855-862.

[16] Liu, T., & Qiu, Z. D. (2002, August). A DWT-based color image steganography scheme. In Signal Processing, 2002 6th International Conference on (Vol. 2, pp. 1568-1571). IEEE.

[17] Noda, H., Niimi, M., & Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, 27(5), 455-461.

[18] Chen, W. Y. (2008). Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Applied Mathematics and computation, 196(1), 40-54.

[19] Zhao, W., Jie, Z., Xin, L., & Qiaoyan, W. (2015). Data embedding based on pixel value differencing and modulus function using indeterminate equation. The Journal of China Universities of Posts and Telecommunications, 22(1), 95-100.

[20] Gholampour, I., & Khosravi, K. (2015). Steganographic schemes with multiple q-ary changes per block of pixels. Signal Processing, 108, 206-219.

[21] Pan, Z., Hu, S., Ma, X., & Wang, L. (2015). A new lossless data hiding method based on joint neighboring coding. Journal of Visual Communication and Image Representation, 26, 14-23.

[22] Hong, W., & Chen, T. S. (2012). A novel data embedding method using adaptive pixel pair matching. IEEE transactions on information forensics and security, 7(1), 176-184.

[23] Weng, S., Zhao, Y., Pan, J. S., & Ni, R. (2008). Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters, 15, 721-724.

[24] Tai, W. L., Yeh, C. M., & Chang, C. C. (2009). Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video technology, 19(6), 906-910.

[25] Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2008). Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3(3), 488-497.

[26] Lou, D. C., & Sung, C. H. (2004). A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Transactions on Multimedia, 6(3), 501-509.

[27] Yi, S., & Zhou, Y. (2017). Binary-block embedding for reversible data hiding in encrypted images. Signal Processing, 133, 40-51.

[28] Bailey, J. P., Beal, A. N., Dean, R. N., Hamilton, M. C., & Tugnait, J. K. (2014). High-frequency reverse-time chaos generation using digital chaotic maps. Electronics Letters, 50(23), 1683-1685.

[29] Baykasoglu, A. (2012). Design optimization with chaos embedded great deluge algorithm. Applied Soft Computing, 12(3), 1055-1067.

[30] Roy, R., Sarkar, A., & Changder, S. (2013). Chaos based edge adaptive image steganography. Procedia Technology, 10, 138-146.

[31] Arivazhagan, S., Jebarani, W. S. L., Kalyani, S. V., & Abinaya, A. D. (2017, March). Mixed chaotic maps based encryption for high crypto secrecy. In Signal Processing, Communication and Networking (ICSCN), 2017 Fourth International Conference on (pp. 1-6). IEEE.

[32] Kodak Lossless True Color Image Suite, http://r0k.us/graphics/kodak/ (05.01.2015)

[33] L. University, UCID Image Dataset, http://homepages.lboro.ac.uk/~cogs/datasets/ucid/ucid.html (18.11.2014).

[34] Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118-127.

[35] Wang, Z., & Bovik, A. C. (2002). Image and Multidimensional Signal Processing-A Universal Image Quality Index. IEEE Signal Processing Letters, 9(3), 81-84.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.