Two-in-One Image Steganography Using Error Diffusion
Image steganography is a technique for concealing a secret message in a cover image unobtrusively. The resultant images are called the stego images. In this paper, we propose a method for concealing a secret image into a cover image of the same size, where the most significant bits (MSBs) of the secret image are embedded in the least significant bits (LSBs) of the cover image after the reversal of the order of the bit sequences. Such a symmetric relationship between MSBs and LSBs derives a complementary between the stego and extracted secret images. We also propose a method for improving the image quality of both stego and extracted secret images by using an error diffusion technique. Experimental results show that the proposed method works well for both grayscale and color images, and the proposed error diffusion method can suppress the noises like false contours caused in the embedding process visually and quantitatively.
F. A. P. Petitcolas, R. Anderson, M. G. Huhn, “Information Hiding - A Survey,” In Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999. DOI: 10.1109/5.771065. https: //ieeexplore.ieee.org/document/771065
K. U. Singh, “A Survey on Image Steganography Techniques,” International Journal of Computer Applications, vol. 97, no. 18, pp. 10–20, 2014. DOI: 10.5120/17105-7746. https://www.ijcaonline.org/archives/volume97/ number18/17105- 7746
A. Rashid, “Digital Watermarking Applications and Techniques: A Brief Review,” International Journal of Computer Applications Technology and Research, vol. 5, no. 3, pp. 147–150, 2016. https://ijcat.com/archives/ volume5/issue3/ijcatr05031006.pdf
S. Bhattacharyya, I. Banerjee, G. Sanyal, “A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier,” Journal of Global Research in Computer Science, vol. 2, no. 4, pp. 1– 16, 2011. http://www.jgrcs.info/index.php/jgrcs/ article/view/99
Y. Qian, J. Dong, W. Wang, T. Tan, T, “Deep learn- ing for steganalysis via convolutional neural networks,” In Proc. of SPIE-IS&T, vol. 9409, no. 94090J, 2015. DOI: 10.1117/12.2083479. http://adsabs.harvard.edu/abs/2015SPIE.9409E..0JQ
C. Xia, Q. Guan, X. Zhao, Z. Xu, Y. Ma, “Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms,” In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 55–66, 2017. ISBN: 978-1-4503-5061-7. https://dl. acm.org/citation.cfm?id=3083243
S.Agarwal, H.Farid, “PhotoforensicsfromJPEGdimples,” In 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017. DOI:10.1109/WIFS.2017.8267641. https://www.cs.dartmouth.edu/farid/downloads/ publications/wifs17.pdf
B. Li, J. He, J. Huang, Y. Q. Shi, “A Survey on Image Steganography and Steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142–172, 2011. https://pdfs.semanticscholar.org/ 3219/b0b80fe8373899f04a9f68826e94475b2c66.pdf
N. Provos, P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Security & Privacy, vol. 99, no. 3, pp. 32–44, 2003. DOI: 10.1109/MSECP.2003.1203220. https: //ieeexplore.ieee.org/document/1203220
J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE MultiMedia, vol. 8, no. 4, pp. 22–28, 2001. DOI: 10.1109/93.959097. https://ieeexplore.ieee.org/document/959097
Pande Gede Pradnya Jaya S.T., Bambang Hidayat, Fiky Y Suratman, “Enhanced LSB Steganography with people detection as stego key generator,” In Proceedings of International Conference on Signals and Systems (ICSigSys), 2017. https://ieeexplore.ieee.org/document/7967078
A. M. Odat, M. A., Otair, “Image Steganography using Modified Least Significant Bit,” Indian Journal of Science & Technology, vol. 9, no. 39, 2016. DOI: 10.17485/ijst/2016/v9i39/86878. http://www.indjst. org/index.php/indjst/article/view/86878
M. M. A. Hadidi, Y. K. Ibrahim, H. K. Ali, “Data Hiding Using Least Significant Bit Approach,” In Proceedings of the 15th WSEAS International Conference on Systems, Recent Researches in System Science, pp. 238–240, 2011. ISBN: 978-1-61804-023-7. http://www.wseas.us/e-library/ conferences/2011/Corfu/SYSTEMS/SYSTEMS- 37.pdf
S. Baluja, “Hiding Images in Plain Sight: Deep Steganography,” Advances in Neural Information Processing Systems 30, Guyon, I., Luxburg, U. V., Ben-
gio, S., Wallach, H., Fergus, R., Vishwanathan, S.,
Garnett, R., Eds.; Curran Associates, Inc., pp. 2069–
, 2017. https://papers.nips.cc/paper/
- hiding- images- in- plain- sight- deep- steganography
D. L. Lau, G. R. Arce, Modern Digital Halftoning Second Edition; CRC Press, 2008. ISBN 9781420047530. https: //www.crcpress.com/Modern- Digital- Halftoning/ Lau- Arce/p/book/9781420047530
R. W. Floyd, L. Steinberg, “An adaptive algorithm for spatial grey scale,” In Proceedings of the Society of Information Display, vo. 17, pp. 75-77, 1976.
M. Sakauchi, Y. Ohsawa, M. Sone, M. Onoe, “Management of the Standard Image Database for Image Processing Researches (SIDBA),” ITEJ Technical Report, vol. 8, no. 38, pp. 7–12, 1984. (in Japanese) https://www.jstage.jst.go.jp/article/tvtr/8/ 38/8_KJ00001965452/_article/- char/ja/
G. Luzardo, J. Aelterman, H. Luong, W. Philips, D. Ochoa, “Real-time false-contours removal for inverse tone mapped HDR content,” In Proceedings of the 25th ACM international conference on Multimedia, 2017. DOI: 10.1145/3123266.3123400. https://biblio.ugent.be/ publication/8533776
Z. Wang, A. C. Bovik, R. Sheikh, E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004. DOI: 10.1109/TIP.2003.819861. https://ieeexplore.ieee.org/document/1284395
A. D. Ker, “A General Framework for Structural Steganalysis of LSB Replacement,” In: Information Hiding, Barni M., Herrera-Joancomart ́ı J., Katzenbeisser S., Pe ́rez-Gonza ́lez F., Eds.; IH 2005; Lecture Notes in Computer Science, vol. 3727. Springer, Berlin, Heidelberg, 2005. https://link. springer.com/chapter/10.1007/11558859_22
S. Dumitrescu, X. Wu, Z. Wang, “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, vol. 51, no. 7, pp. 1995– 2007, 2003. DOI: 10.1109/TSP.2003.812753. https:// ieeexplore.ieee.org/document/1206706
A. D. Ker, R. Bo ̈hme, “Revisiting Weighted Stego- Image Steganalysis,” Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE Electronic Imaging, vol. 6819, San Jose, CA, pp. 0501–0517, 2008. http://www.cs.ox.ac.uk/andrew. ker/docs/ADK30B.pdf
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).