NEWS

DATA HIDING TECHNIQUE FOR COLOR IMAGES USING PIXEL VALUE DIFFERENCING AND CHAOTIC MAP


(Received: 13-Feb.-2022, Revised: 12-Apr.-2022 , Accepted: 27-Apr.-2022)
The huge advance in information technology and communication has resulted in the growing usage of digital networks, which consequently handed an important role to information security. Steganography is the art of hiding secret message bits into different multimedia data to provide the transferred information with security against unauthorized access. Most techniques applying the pixel value differencing (PVD) approach depend on the sequential embedding manner that lacks security. This study proposes a method that uses a complex chaotic map to randomly choose the coefficients for embedding a secret message. First, the cover image is transformed through integer wavelet transform (IWT). The embedding process starts in the highest-frequency band of IWT and continues to the next subbands according to the message size. Adaptive embedding is then performed depending on the intensity variation between pixel pairs using PVD and least significant bit substitution. The nonsequential embedding performed using the chaotic map makes the method more secure. The experimental results show that the proposed technique achieves a high peak signal-to-noise ratio with an improved capacity compared with other techniques.

[1] H. M. Ghadirli, A. Nodehi and R. Enayatifar, "An Overview of Encryption Algorithms in Color Images," Signal Processing, vol. 164, pp. 163-185, 2019.

[2] P. Ayubi, S. Setayeshi and A. M. Rahmani, "Deterministic Chaos Game: A New Fractal Based Pseudo-random Number Generator and Its Cryptographic Application," Journal of Information Security and Applications, vol. 52, p. 102472, 2020.

[3] I. J. Kadhim, P. Premaratne, P. J. Vial and B. Halloran, "Comprehensive Survey of Image Steganography: Techniques, Evaluations and Trends in Future Research," Neurocomputing, vol. 335, pp. 299-326, 2019.

[4] E. M. El Houby and N. I. Yassin, "Wavelet-hadamard Based Blind Image Watermarking Using Genetic Algorithm and Decision Tree," Multimedia Tools and Applications, vol. 79, pp. 28453-28474, 2020.

[5] N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer, vol. 31, pp. 26-34, 1998.

[6] S. Nazari, A. M. Eftekhari‐Moghadam and M. S. Moin, "A Novel Image Steganography Scheme Based on Morphological Associative Memory and Permutation Schema," Security and Communication Networks, vol. 8, pp. 110-121, 2015.

[7] Z. Xia, X. Wang, X. Sun and B. Wang, "Steganalysis of Least Significant Bit Matching Using Multi‐order Differences," Security and Communication Networks, vol. 7, pp. 1283-1291, 2014.

[8] M. Afrakhteh and J. A. Lee, "Adaptive Least Significant Bit Matching Revisited with the Help of Error Images," Security and Communication Networks, vol. 8, pp. 510-515, 2015.

[9] D.-C. Wu and W.-H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, vol. 24, pp. 1613-1626, 2003.

[10] H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang, "Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods," IEE Proceedings-Vision, Image and Signal Processing, vol. 152, pp. 611-615, 2005.

[11] H. Al-Dmour and A. Al-Ani, "A Steganography Embedding Method Based on Edge Identification and XOR Coding," Expert Systems with Applications, vol. 46, pp. 293-306, 2016.

[12] A. Saxena and F. C. Fernandes, "DCT/DST-based Transform Coding for Intra Prediction in Image/Video Coding," IEEE Transactions on Image Processing, vol. 22, pp. 3974-3981, 2013.

[13] A. K. Gulve and M. S. Joshi, "An Image Steganography Algorithm with Five pixel Pair Differencing and Gray Code Conversion," International Journal of Image, Graphics and Signal Processing, vol. 6, p. 12, DOI:10.5815/ijigsp.2014.03.02, 2014.

[14] A. K. Gulve and M. S. Joshi, "An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach," Mathematical Problems in Engineering, vol. 2015, DOI: 10.1155/2015/684824, 2015.

[15] G. Swain, "Two New Steganography Techniques Based on Quotient Value Differencing with Addition-subtraction Logic and PVD with Modulus Function," Optik, vol. 180, pp. 807-823, 2019.

[16] G. Paul, S. K. Saha and D. Burman, "A PVD Based High Capacity Steganography Algorithm with Embedding in Non-sequential Position," Multimedia Tools and Applications, vol. 79, pp. 13449-13479, 2020.

[17] P. C. Mandal, I. Mukherjee and B. N. Chatterji, "High Capacity Reversible and Secured Data Hiding in Images Using Interpolation and Difference Expansion Technique," Multimedia Tools and Applications, vol. 80, pp. 3623-3644, 2021.

[18] A. K. Sahu and G. Swain, "High Fidelity Based Reversible Data Hiding Using Modified LSB Matching and Pixel Difference," Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 4, DOI: 10.1016/j.jksuci.2019.07.004, 2019.

[19] S. Solak and U. Altınışık, "Image Steganography Based on LSB Substitution and Encryption Method: Adaptive LSB+ 3," Journal of Electronic Imaging, vol. 28, p. 043025, DOI: 10.1117/1.JEI.28.4.043025, 2019.

[20] S. Solak, "High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms," IEEE Access, vol. 8, pp. 166513-166524, 2020.

[21] G. Paul, I. Davidson, I. Mukherjee and S. Ravi, "Keyless Steganography in Spatial Domain Using Energetic Pixels," Proc. of the International Conference on Information Systems Security (ICISS 2012), vol. 7671, pp. 134-148, 2012.

[22] X. Liao, Z. Qin and L. Ding, "Data Embedding in Digital Images Using Critical Functions," Signal Processing: Image Communication, vol. 58, pp. 146-156, 2017.

[23] D. Setiadi, "Improved Payload Capacity in LSB Image Steganography Uses Dilated Hybrid Edge Detection," J. King Saud Univ.-Comput. Inf. Sci., vol. 34, no. 2, DOI:10.1016/j.jksuci.2019.12.007, 2019.

[24] B. Feng, W. Lu and W. Sun, "Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture," IEEE Transactions on Information Forensics and Security, vol. 10, pp. 243-255, 2014.

[25] S. Chakraborty, A. S. Jalal and C. Bhatnagar, "LSB Based Non Blind Predictive Edge Adaptive Image Steganography," Multimedia Tools and Applications, vol. 76, pp. 7973-7987, 2017.

[26] X. Liao, Y. Yu, B. Li, Z. Li and Z. Qin, "A New Payload Partition Strategy in Color Image Steganography," IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, pp. 685-696, 2019.

[27] X. Liao, J. Yin, M. Chen and Z. Qin, "Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features," IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 897-911, 2020.

[28] W. H. Al-Qwider and J. N. B. Salameh, "Novel Technique for Securing Data Communication Systems by Using Cryptography and Steganography," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 3, no. 2, pp. 110-130, 2017.

[29] A. Laffont, P. Maniriho, A. Ramsi, G. Guerteau and T. Ahmad, "Enhanced Pixel Value Modification Based on Modulus Function for RGB Image Steganography," Proc. of the 11th Int. Conf. on Information & Communication Technology and System (ICTS), 2017, pp. 61-66, Surabaya, Indonesia, 2017.

[30] J. Wang, W. B. Wan, X. X. Li, J. De Sun and H. X. Zhang, "Color Image Watermarking Based on Orientation Diversity and Color Complexity," Expert Systems with Applications, vol. 140, p. 112868, DOI: 10.1016/j.eswa.2019.112868, 2020.

[31] J. Abraham and V. Paul, "An Imperceptible Spatial Domain Color Image Watermarking Scheme," Journal of King Saud University-Computer and Information Sciences, vol. 31, no. 1, pp. 125-133, 2019.

[32] S. A. Parah, J. A. Sheikh, N. A. Loan and G. Bhat, "A Robust and Computationally Efficient Digital Watermarking Technique Using Inter Block Pixel Differencing," in Multimedia Forensics and Security, ed. Springer, pp. 223-252, 2017.

[33] S. M. Saraireh and A. M. Matarneh, "Higher Level Security Approach for Data Communication System Based on AES Cryptography and DWT Steganography," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 2, no. 3, pp. 179-193, 2016.

[34] M. Y. Valandar, P. Ayubi and M. J. Barani, "A New Transform Domain Steganography Based on Modified Logistic Chaotic Map for Color Images," Journal of Information Security and Applications, vol. 34, pp. 142-151, 2017.

[35] M. Y. Valandar, M. J. Barani, P. Ayubi and M. Aghazadeh, "An Integer Wavelet Transform Image Steganography Method Based on 3D Sine Chaotic Map," Multimedia Tools and Applications, vol. 78, pp. 9971-9989, 2019.

[36] M. Ghebleh and A. Kanso, "A Robust Chaotic Algorithm for Digital Image Steganography," Communications in Nonlinear Science and Numerical Simulation, vol. 19, pp. 1898-1907, 2014.

[37] J. Sharafi, Y. Khedmati and M. Shabani, "Image Steganography Based on a New Hybrid Chaos Map and Discrete Transforms," Optik, vol. 226, no. 2, p. 165492, 2021.

[38] N. I. R. Yassin and E. M. F. El Houby, "Image Steganography Technique Based on Integer Wavelet Transform Using Most Significant Bit Categories," International Journal of Intelligent Engineering and Systems, vol. 15, pp. 499-508, 2022.

[39] C. Liji, K. Indiradevi and K. A. Babu, "Integer-to-integer Wavelet TransformBased ECG Steganography for Securing Patient Confidential Information," Procedia Technology, vol. 24, pp. 1039-1047, 2016.

[40] A. La Cour–Harbo and A. Jensen, "Wavelets and the Lifting Scheme," Proc. of Encyclopedia of Complexity and Systems Science, pp. 10007-10031, DOI: 10.1007/978-0-387-30440-3_588, Springer New York, 2009.

[41] P. Ayubi, M. Jafari Barani, M. Yousefi Valandar, B. Yosefnezhad Irani and R. Sedagheh Maskan Sadigh, "A New Chaotic Complex Map for Robust Video Watermarking," Artificial Intelligence Review, vol. 54, pp. 1237-1280, 2021.

[42] N. Provos, "Defending against Statistical Steganalysis," Proc. of the 10th USENIX Security Symposium (USENIX Security 01), [Online], Available: https://www.usenix.org/conference/10th-usenix-security-symposium/defending-against-statistical-steganalysis, 2001.

[43] USC-SIPI Image Database, [Online], Available: http://sipi.usc.edu/database/database.php?volume=misc.

[44] Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Transactions on Image Processing, vol. 13, pp. 600-612, 2004.

[45] N.-I. Wu and M.-S. Hwang, "Data Hiding: Current Status and Key Issues," IJ Network Security, vol. 4, pp. 1-9, 2007.

[46] S. Shen, L. Huang and Q. Tian, "A Novel Data Hiding for Color Images Based on Pixel Value Difference and Modulus Function," Multimedia Tools and Applications, vol. 74, pp. 707-728, 2015.