Two-in-One Image Steganography Using Error Diffusion

Ruixi Dong, Kohei Inoue, Kenji Hara, Kiichi Urahama

Abstract


Image steganography is a technique for concealing a secret message in a cover image unobtrusively. The resultant images are called the stego images. In this paper, we propose a method for concealing a secret image into a cover image of the same size, where the most significant bits (MSBs) of the secret image are embedded in the least significant bits (LSBs) of the cover image after the reversal of the order of the bit sequences. Such a symmetric relationship between MSBs and LSBs derives a complementary between the stego and extracted secret images. We also propose a method for improving the image quality of both stego and extracted secret images by using an error diffusion technique. Experimental results show that the proposed method works well for both grayscale and color images, and the proposed error diffusion method can suppress the noises like false contours caused in the embedding process visually and quantitatively.

 


Full Text:

PDF

References


F. A. P. Petitcolas, R. Anderson, M. G. Huhn, “Information Hiding - A Survey,” In Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999. DOI: 10.1109/5.771065. https: //ieeexplore.ieee.org/document/771065

K. U. Singh, “A Survey on Image Steganography Techniques,” International Journal of Computer Applications, vol. 97, no. 18, pp. 10–20, 2014. DOI: 10.5120/17105-7746. https://www.ijcaonline.org/archives/volume97/ number18/17105- 7746

A. Rashid, “Digital Watermarking Applications and Techniques: A Brief Review,” International Journal of Computer Applications Technology and Research, vol. 5, no. 3, pp. 147–150, 2016. https://ijcat.com/archives/ volume5/issue3/ijcatr05031006.pdf

S. Bhattacharyya, I. Banerjee, G. Sanyal, “A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier,” Journal of Global Research in Computer Science, vol. 2, no. 4, pp. 1– 16, 2011. http://www.jgrcs.info/index.php/jgrcs/ article/view/99

Y. Qian, J. Dong, W. Wang, T. Tan, T, “Deep learn- ing for steganalysis via convolutional neural networks,” In Proc. of SPIE-IS&T, vol. 9409, no. 94090J, 2015. DOI: 10.1117/12.2083479. http://adsabs.harvard.edu/abs/2015SPIE.9409E..0JQ

C. Xia, Q. Guan, X. Zhao, Z. Xu, Y. Ma, “Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms,” In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 55–66, 2017. ISBN: 978-1-4503-5061-7. https://dl. acm.org/citation.cfm?id=3083243

S.Agarwal, H.Farid, “PhotoforensicsfromJPEGdimples,” In 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017. DOI:10.1109/WIFS.2017.8267641. https://www.cs.dartmouth.edu/farid/downloads/ publications/wifs17.pdf

B. Li, J. He, J. Huang, Y. Q. Shi, “A Survey on Image Steganography and Steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142–172, 2011. https://pdfs.semanticscholar.org/ 3219/b0b80fe8373899f04a9f68826e94475b2c66.pdf

N. Provos, P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Security & Privacy, vol. 99, no. 3, pp. 32–44, 2003. DOI: 10.1109/MSECP.2003.1203220. https: //ieeexplore.ieee.org/document/1203220

J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE MultiMedia, vol. 8, no. 4, pp. 22–28, 2001. DOI: 10.1109/93.959097. https://ieeexplore.ieee.org/document/959097

Pande Gede Pradnya Jaya S.T., Bambang Hidayat, Fiky Y Suratman, “Enhanced LSB Steganography with people detection as stego key generator,” In Proceedings of International Conference on Signals and Systems (ICSigSys), 2017. https://ieeexplore.ieee.org/document/7967078

A. M. Odat, M. A., Otair, “Image Steganography using Modified Least Significant Bit,” Indian Journal of Science & Technology, vol. 9, no. 39, 2016. DOI: 10.17485/ijst/2016/v9i39/86878. http://www.indjst. org/index.php/indjst/article/view/86878

M. M. A. Hadidi, Y. K. Ibrahim, H. K. Ali, “Data Hiding Using Least Significant Bit Approach,” In Proceedings of the 15th WSEAS International Conference on Systems, Recent Researches in System Science, pp. 238–240, 2011. ISBN: 978-1-61804-023-7. http://www.wseas.us/e-library/ conferences/2011/Corfu/SYSTEMS/SYSTEMS- 37.pdf

S. Baluja, “Hiding Images in Plain Sight: Deep Steganography,” Advances in Neural Information Processing Systems 30, Guyon, I., Luxburg, U. V., Ben-

gio, S., Wallach, H., Fergus, R., Vishwanathan, S.,

Garnett, R., Eds.; Curran Associates, Inc., pp. 2069–

, 2017. https://papers.nips.cc/paper/

- hiding- images- in- plain- sight- deep- steganography

D. L. Lau, G. R. Arce, Modern Digital Halftoning Second Edition; CRC Press, 2008. ISBN 9781420047530. https: //www.crcpress.com/Modern- Digital- Halftoning/ Lau- Arce/p/book/9781420047530

R. W. Floyd, L. Steinberg, “An adaptive algorithm for spatial grey scale,” In Proceedings of the Society of Information Display, vo. 17, pp. 75-77, 1976.

M. Sakauchi, Y. Ohsawa, M. Sone, M. Onoe, “Management of the Standard Image Database for Image Processing Researches (SIDBA),” ITEJ Technical Report, vol. 8, no. 38, pp. 7–12, 1984. (in Japanese) https://www.jstage.jst.go.jp/article/tvtr/8/ 38/8_KJ00001965452/_article/- char/ja/

G. Luzardo, J. Aelterman, H. Luong, W. Philips, D. Ochoa, “Real-time false-contours removal for inverse tone mapped HDR content,” In Proceedings of the 25th ACM international conference on Multimedia, 2017. DOI: 10.1145/3123266.3123400. https://biblio.ugent.be/ publication/8533776

Z. Wang, A. C. Bovik, R. Sheikh, E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004. DOI: 10.1109/TIP.2003.819861. https://ieeexplore.ieee.org/document/1284395

A. D. Ker, “A General Framework for Structural Steganalysis of LSB Replacement,” In: Information Hiding, Barni M., Herrera-Joancomart ́ı J., Katzenbeisser S., Pe ́rez-Gonza ́lez F., Eds.; IH 2005; Lecture Notes in Computer Science, vol. 3727. Springer, Berlin, Heidelberg, 2005. https://link. springer.com/chapter/10.1007/11558859_22

S. Dumitrescu, X. Wu, Z. Wang, “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, vol. 51, no. 7, pp. 1995– 2007, 2003. DOI: 10.1109/TSP.2003.812753. https:// ieeexplore.ieee.org/document/1206706

A. D. Ker, R. Bo ̈hme, “Revisiting Weighted Stego- Image Steganalysis,” Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE Electronic Imaging, vol. 6819, San Jose, CA, pp. 0501–0517, 2008. http://www.cs.ox.ac.uk/andrew. ker/docs/ADK30B.pdf




DOI: https://doi.org/10.12792/jiiae.7.42

Refbacks

  • There are currently no refbacks.


Online edition: ISSN 2187-8811 Print edition: ISSN 2188-1758