Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract Significant increase in data traffic over the Internet has given rise to
many data security issues. Steganography is a technique which is used to hide the
existence of secret communication. Hence, it is extensively used to solve the issues
related to data security. In this paper, a secure and lossless spatial domain image
steganography technique is proposed. Stream of secret data is hidden in quarter part
of image by identifying suitable locations to hide 2 bits of secret data in each pixel,
resulting in generation of coefficients corresponding to the location of match. These
coefficients are hidden in remaining part of image using LSB replacement
steganography. Genetic algorithm is used to find best possible location to hide these
coefficients in the image, making the proposed technique very secure and almost
impossible to extract secret data from it. The result of the proposed technique is
compared with LSB replacement steganography where in same amount of secret
data is embedded. It is observed that the proposed technique is much superior as
compared to LSB steganography. It provides improvement in MSE and PSNR
values; in addition, the degradation in histogram is also minimal thus eliminating
histogram attack. Average PSNR value of stego-image obtained from proposed
technique is 53.11 dB at two bits per pixel data embedding rate compared to 52.21
obtained by LSB technique.
1 Introduction
used to modify second LSB of image so that the stego-image bypasses RS analysis
and also provide a better PSNR value. Average PSNR value of 41.2 dB was
obtained during various experiments. Nosrati et al. [9] proposed a before embed-
ding steganographic scheme. In this technique, the secret information is hidden in
image segments of cover image. Genetic algorithm is used to find the suitable
locations in cover image to embed the secret information.
The rest of the paper is organized as follows: Sect. 2 briefly explains genetic
algorithm. The proposed algorithm is explained in detail in Sect. 3. Experimental
results and discussion are presented in Sect. 4. Section 5 concludes the paper.
2 Genetic Algorithm
eight bits, so there are eight possible locations for mapping the secret data bits on
each pixel of cover image. Based on location of match, we generate corresponding
coefficients, as illustrated in Fig. 1.
If there is no match between secret data bits and cover image pixel, then these
bits are embedded in LSBs of cover image pixel. It is mostly possible to embed two
bits of secret data in each pixel without changing its value. However to successfully
recover the secret data, we should know the value of coefficients. We propose to
hide these coefficients in the unused part of image using genetic algorithm to find
the most optimal embedding locations.
Figure 2 illustrates the proposed mapping process with the help of an example in
which 4 bytes of secret data is embedded in 4 4 cover image. Figure 2a shows
four bytes of secret data and its binary representation. Figure 2b shows 4 4 cover
image and its binary representation along with the position of match between secret
data and cover image pixel highlighted. Figure 2c shows the coefficients generated
by mapping.
In proposed technique, secret data is embedded in 1/4th part of the image and rest
part of the image is used to save the coefficients generated from data mapping. For a
grey scale image with 256 256 resolution, we can use 128 128 pixels to hide
the secret data; hence, the resultant data embedding capacity is 2 128 128 =
32,768 bits. In this case, a matrix of size 128 128 is generated for the coefficients.
From Fig. 2c, it can be observed that value of coefficients is in the range of 0–7;
hence, each coefficient requires 3 bits for embedding. The coefficients matrix is split
into three-bit planes. These three-bit planes are optimally embedded in LSBs of
(a)
13 98 57 129 0000110 1 0110001 0 0 01 1 1 0 0 1 1 0 0 0 0 0 01
(b)
57 59 62 68 00111001 00111011 00111110 01000100
71 73 58 97 01000111 01001001 00111010 01100001
47 56 98 78 00101111 00111000 01100010 01001110
67 68 98 125 01000011 01000100 01100010 01111101
(c)
1 6 1 2
2 2 6 4
6 3 0 3
5 0 2 0
Fig. 2 Proposed mapping process to hide secret data in cover image. a Secret data and its binary
representation. b Cover image (4 4 pixels) and its binary representation. c Generated coefficient
matrix
A Secure Spatial Domain Image Steganography … 123
remaining 3/4th part of image using genetic algorithm. The task of finding an optimal
match between coefficient matrix and LSBs of cover image is modelled as search and
optimization problem. Genetic algorithm is employed to solve this search and
optimization problem. Each bit plane of coefficient matrix is divided into blocks of
size 8 8 yielding 256 blocks. An optimal sequence of 256 numbers is searched to
embed these blocks of coefficients in the rest of image. Linear congruential generator
(LCG) is used to generate a pseudo-random sequence, and genetic algorithm is used
to modify the parameters which control the result of LCG. LCG requires initial seed
value, a multiplying factor and an offset to generate sequence of m numbers; it is
illustrated in Eq. 1. Xn + 1 is the value of next integer in the sequence, Xn is the
value of present integer, a is the multiplying factor, c is the offset value and m is the
length of sequence.
Xn þ 1 ¼ ða Xn þ cÞ mod m ð1Þ
Fig. 3 Chromosome
structure
Multiplier (a) Offset (c) Initial seed (X0)
124 P.D. Shah and R.S. Bichkar
To perform experiment, we have selected standard grey scale test images. The
resolution of cover image is 256 256, and the secret data is also a grey scale
image with resolution 64 64. The performance of proposed technique is com-
pared with 2-bit LSB replacement steganography with same data embedding
capacity. To perform experimentation, Matlab 8.1 version was used. MSE and
PSNR of stego-images are obtained by Eqs. 2 and 3, respectively, where M and
N are total number of rows and columns in the image, respectively. Xij and Yij are
pixel values of ijth location of original image and stego-image, respectively.
1 XM X N 2
MSE ¼ Xij Yij ð2Þ
MN i¼1 j¼1
ð255Þ2
PSNR ¼ 10 log10 ð3Þ
MSE
A Secure Spatial Domain Image Steganography … 125
Fig. 4 Test images used in experiment. a–e Cover images (baboon, lena, barbara, house and
cameraman). f Secret data image (boat)
Subjective analysis and histogram analysis are also performed on the results
obtained from the both techniques. The test images used for experimentation are
shown in Fig. 4. Five natural images are chosen as cover images; they are Baboon,
Lena, Barbara, House and Cameraman. Boat image is used as secret data image.
Table 1 Comparison of the proposed technique with LSB steganography (the boat image is used
as secret data)
Cover image Proposed technique LSB replacement
MSE PSNR MSE PSNR
Baboon 0.23 54.43 0.39 52.18
Lena 0.38 52.33 0.39 52.20
Barbara 0.27 53.80 0.40 52.17
House 0.35 52.64 0.38 52.27
Cameramen 0.37 52.36 0.39 52.23
Fig. 6 Stego-images:
a Baboon stego-image
obtained from LSB
steganography, b Baboon
stego-image obtained from
proposed technique, c Lena
stego-image obtained from
LSB steganography, d Lena
stego-image obtained from
proposed technique
A Secure Spatial Domain Image Steganography … 127
The results clearly suggest the superiority of proposed optimally mapped LSB
technique over LSB replacement technique. The PSNR values of stego-image
obtained from proposed techniques are higher compared to LSB steganography for
various images which prove the efficiency of proposed technique. The MSE value
of all stego-images obtained from proposed technique is less than 0.38 which
undoubtedly indicates that there is very less amount of deviation between cover
image and stego-image. Hence, it can be said that proposed technique is highly
imperceptible. Figure 5 illustrates the comparison between PSNR values of
stego-image obtained from proposed technique and LSB replacement steganogra-
phy for various images. Figure 6 shows the stego-images obtained from LSB
steganography and proposed technique for Baboon and Lena image.
secret data very evident because its stego-image produces a step pattern. In this step
pattern, one pixel value of histogram is suppressed and the adjacent value is
increased which can be easily detected by histogram analysis.
5 Conclusion
References
1. Cheddad A., Condell J., Curran K. and Mc Kevitt P.: Digital Image Steganography: Survey
and Analysis of Current Methods. Signal Processing, vol. 90, no. 3, pp. 727–752, (2010).
2. Chugh G., Yadav R. and Saini R.: A New Image Steganographic Approach Based on Mod
Factor for RGB Images. International Journal of signal processing, image processing, and
pattern recognition, vol. 7, no. 3, pp. 27–44, (2014).
3. Subhedar M.S. and Mankar V.H.: Current status and key issues in image steganography: A
survey. Computer science review, vol. 13, pp. 95–113, (2014).
4. Fridrich J., Goljan M. and Du R.: Reliable detection of LSB steganography in color and
grayscale images. In Proceedings of the 2001 workshop on Multimedia and security: new
challenges, pp. 27–30, (2001).
5. Li B., He J., Huang J. and Shi Y.Q.: A survey on image steganography and steganalysis.
Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142–172,
(2011).
6. Chanu Y. J., Tuithung T. and Singh K.M.: A short survey on image steganography and
steganalysis techniques. In Proceedings of 3rd National Conference on Emerging Trends and
Applications in Computer Science, pp. 52–55, (2012).
7. Kanan H.R. and Nazeri B.: A novel image steganography scheme with high embedding
capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with
Applications, vol. 41, no. 14, pp. 6123–6130, (2014).
8. Wang S., Yang B. and Niu X.: A secure steganography method based on genetic algorithm.
Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 1, pp. 28–35,
(2010).
9. Nosrati M., Hanani A. and Karimi R.: Steganography in Image Segments using Genetic
Algorithm. In proceedings of Fifth International Conference on Advanced Computing &
Communication Technologies, pp. 102–107, (2015).
10. Goldberg and David E.: Genetic algorithms. Pearson Education India, (2006).