Total views : 125

An Experimental Investigation of Statistical Model based Secure Steganography for JPEG Images

Affiliations

  • Department of Information Technology, University of Moratuwa, Bandaranayake Mawatha, Katubedda, Moratuwa – 10400, Sri Lanka

Abstract


Objectives: This paper intends to propose a secure steganography approach in JPEG compressed domain by providing more possibilities to analyzing the DCT coefficients in lower frequency area by modifying the primary Quantization Table (QT) with generating random data hiding patterns. Methods/Statistical analysis: The upper left part of the primary QT extracted from gray scale image dataset is modified by multiplying the factors 1/4, 1/2 and 3/4 to produce secondary QTs for investigating randomly generated data hiding patterns in lower frequency area of quantized DCT coefficients by Least Significant Bit (LSB) method. We create a pool of QTs and those tables are cross checked with randomly generated hiding patterns to find best QT with appropriate data hiding pattern by assessing Peak Signal to Noise Ratio (PSNR). Our method can be used to attain trade-off between some parameters such as image features, QT, data hiding pattern. Further, statistical features of a given image data set are extracted and analyzed with the selected QT and appropriate hiding pattern by using R software. Findings: The Experimental results revealed that our proposed method can embed high capacity data (57 bits per block) without noticeable visual artifacts by considering lower frequency coefficients for data hiding by assessing the image steganographic requirements. The maximum PSNR value 48 and the minimum PSNR value 32 are found among the fifty jpeg gray images based on their contents. Although, the embedding capacity and PSNR fluctuate among images, our method can be used to attain trade-off between some parameters such as image features, QT, data hiding pattern. Further, statistical features of a given image data set are extracted and analyzed with the selected QT and appropriate hiding pattern using R. The hypothesis test was deployed among the QTs, hiding patterns and image features. The following five P-Values, 0.04128, 0.02486, 0.02241, 0.04898, 0.01966 less than 0.05 show the good relationship between the QTs, hiding patterns and image features among the cover images and also the following four P-Values, 0.00685, 0.03017, 0.001085, 4.568e-12, less than 0.05, show the good relationship between those above mentioned factors among the stego images. Application/Improvements: Finally, we present a secure model to explore the relationship between QT, hiding pattern and image contents. The found model is stego invariant for sender and receiver that will enable them to identify QT and pattern by extracting the image features without fully decoding the stego jpeg image. This method is very practical and adaptable for extending QTs and hiding patterns.

Keywords

Data Hiding, DCT, JPEG Steganography, PSNR, Quantization Table.

Full Text:

 |  (PDF views: 102)

References


  • Subhedar MS, Mankar VH. Current status and key issues in image steganography: a survey. Computer Science Review, Elsevier, ScienceDirect. 2014 Nov; 13–14:95–113.Crossref
  • Musa EP, Philip S. Secret communication using image steganography. African Journal of Computing and ICT. 2015 Sep; 8(3):1–8.
  • Roy R, Changder S. Quality evaluation of image steganography techniques: a heuristics based approach. International Journal of Security and Its Applications. 2016; 10(4):179– 96.Crossref
  • Sumathi CP, Santanam T, Umamaheswari G. A study of various steganographic techniques used for information hiding. International Journal of Computer Science & Engineering Survey (IJCSES). 2013 Dec; 4(6):1–17.
  • Shihab AM, Mohammed RK, Abed WM. Evaluating the performance of the secure block permutation image steganography Algorithm. International Journal of Network Security and Its Applications (IJNSA). 2013 Sep; 5(5):167– 77.Crossref
  • Abbas T, Beiji Z, Abdullah MY. Information security technique in frequency domain. International Journal of Digital Content Technology and its Applications (JDCTA). 2011 Dec; 5(12):279–289.
  • Kuo WC, Kuo SH, Wuu LC. High embedding reversible data hiding scheme for JPEG. 2010. In the Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany; 2010 Oct 15–17. p. 74–77.Crossref
  • Westfeld A. F5-a steganographic algorithm: high capacity despite better steganalysis. In the Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer. 2001 Oct; 2137:289– 302.Crossref
  • Goyat R, Goyat S. Review of high capacity image steganography using frequency domain. Journal of Technological Advances and Scientific Research. 2015; 1(4):1–6.
  • Liu CL, Liao SR. High-performance JPEG steganography using complementary embedding strategy. Pattern Recognition, Elsevier, ScienceDirect. 2008 Sep; 41(9):2945– 55.Crossref
  • Singh P, Kumar S, Kaur J. A steganographic technique for JPEG using modified quantization table. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(4):1–6.
  • Singh S. An algorithm for improving the quality of compacted JPEG image by minimizes the blocking artifacts. International Journal of Computer Graphics and Animation (IJCGA). 2012 Jul; 2(2/3):17–35.Crossref
  • Viraktamath SV, Attimarad GV. Impact of quantization matrix on the performance of JPEG. International Journal of Future Generation Communication and Networking. 2011 Sep; 4(3):107–18.
  • Chang CC, Chen TS, Chung LZ. A steganographic method based upon JPEG and quantization table modification. Information Sciences, Elsevier, ScienceDirect. 2002 Mar; 141(1–2):123–38.Crossref
  • Iwata M, Miyake K, Shiozaki A. Digital steganography utilizing features of JPEG images. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 2004 Apr 1; E87–A(4):929–36.
  • Chang CC, Lin CC, Tseng CS, Tai WL. Reversible hiding in DCT-based compressed images. Information Sciences, Elsevier, ScienceDirect. 2007 Jul; 177(13): 2768–86.Crossref
  • Almohammad A, Ghinea G, Hierons RM. JPEG steganography: a performance evaluation of quantization tables. In the Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) International Conference on Advanced Information Networking and Applications, Bradford, United Kingdom; 2009 May 26–29. p. 471–8.Crossref
  • Cheng Z, Yoo KY. A reversible JPEG-to-JPEG data hiding technique. In the Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) 4th International Conference on Innovative Computing Information and Control, Kaohsiung,Taiwan; 2009 Dec 7–9. p. 635–8. Crossref
  • Sakai H, Kuribayashi M, Morii M. Adaptive reversible data hiding for JPEG images. In the Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) International Symposium on Information Theory and its Applications, Auckland, New Zealand; 2008 Dec 7–10. p. 1–6.Crossref
  • Amin M, Abdullkader HM, Ibrahem HM, Sakr AS. A steganographic method based on DCT and new quantization technique. International Journal of Network Security. 2014 Jul; 16(4): 265–70.
  • Kommini C, Ellanti K, Asadi S. Image based secret communication using double compression. International Journal of Computer Applications. 2011 May; 21(7):6–9.Crossref
  • Sachdeva S, Sharma A, Gill V. Colour image steganography using modified JPEG quantization technique. International Journal of Latest Research in Science and Technology. 2012 May–Jun; 1(1:1–5):1–5.
  • Lin CC, Shiu PF. High capacity data hiding scheme for DCT based images. Journal of Information Hiding and Multimedia Signal Processing. 2010 Jul; 1(3):220–40.
  • Li X, Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, Elsevier, ScienceDirect. 2007 Aug 1; 177(15):3099– 109.Crossref
  • Kumar M, Yadav M. Image steganography using frequency domain. International Journal of Scientific and Technology research. 2014 Sep; 3(9):226–30.
  • Mitra S, Dhar M, Mondal A, Saha N, Islam R. DCT based steganographic evaluation parameter analysis in frequency domain by using modified JPEG luminance quantization table. Journal of Computer Engineering. 2015 Jan–Feb; 17(1):68–74.
  • Wang K, Lu ZM, Hu YJ. A high capacity lossless data hiding scheme for JPEG images. The Journal of Systems and Software, Elsevier, Science Direct. 2013 Jul; 86(7):1965–75. Crossref
  • Nag A, Biswas S, Sarkar D, Sarkar PP. A novel technique for image steganography based on block-DCT and huffman encoding. International Journal of Computer Science and Information Technology. 2010 Jun; 2(3):103–12. Crossref
  • Shahana T. A secure DCT image steganography based on public-key cryptography. International Journal of Computer Trends and Technology. 2013 Jul; 4(7):2039–43.
  • Wang C, Ni J. An efficient jpeg steganographic scheme based on the block entropy of DCT coefficients sign in or purchase. In the Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan; 2012 Mar 25–30. p. 1785–8.
  • Akila N, Padmaa ME. Secured communication using JPEG compression of steganography. International Journal of Emerging Technology in Computer Science and Electronics (IJETCSE). 2015 Feb; 12(4):121–3.
  • Yu L, Zhao Y, Ni R, Zhu Z. PM1 steganography in JPEG images using genetic algorithm. Soft Computing. 2009 Feb; 13(4):393–400.Crossref
  • Lin CC, Shiu PF. DCT-based reversible data hiding scheme. Journal of Software. 2010 Feb; 5(2):214–24.
  • Chen PY, Chen WC. Secret communication based on quantization tables. International Journal of Applied Science and Engineering. 2015; 13(1):37–54.
  • Lorente AS, Cumbrera R, Fonseca Y. Steganographic algorithm of private key on the domain of the cosine discrete transform. Revista Cubana de Ciencias Informaticas. 2016 Jan; 10(2):116–31.
  • Noda H, Niimi M, Kawaguchi E. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, Elsevier, Science Direct. 2006 Apr 1; 27(5):455–61 Crossref
  • Tseng HW, Chang CC. High capacity data hiding in JPEG-compressed images. Informatica. 2004; 15(1):127–42.
  • Pevny T, Fridrich J. Detection of double–compression in JPEG images for applications in steganography. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Information Forensics and Security. 2008 Jun; 3(2):247–58.Crossref
  • Malik F, Baharudin B. The statistical quantized histogram texture features analysis for image retrieval based on median and laplacian filters in the DCT domain. The International Arab Journal of Information Technology. 2013 Nov; 10(6):1–9.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.