scholarly journals Securing LSB embedding against structural steganalysis

2021 ◽  
pp. 1-23
Author(s):  
Brian A. Powell

This work explores the extent to which LSB embedding can be made secure against structural steganalysis through a modification of cover image statistics prior to message embedding. LSB embedding disturbs the statistics of consecutive k-tuples of pixels, and a kth-order structural attack detects hidden messages with lengths in proportion to the size of the imbalance amongst sets of k-tuples. To protect against kth-order structural attacks, cover modifications involve the redistribution of k-tuples among the different sets so that symmetries of the cover image are broken, then repaired through the act of LSB embedding so that the stego image bears the statistics of the original cover. We find this is only feasible for securing against up to 3rd-order attacks since higher-order protections result in virtually zero embedding capacities. To protect against 3rd-order attacks, we perform a redistribution of triplets that also preserves the statistics of pairs. This is done by embedding into only certain pixels of each sextuplet, constraining the maximum embedding rate to be ⩽ 2 / 3 bits per channel. Testing on a variety of image formats, we report best performance for JPEG-compressed images with a mean maximum embedding rate undetectable by 2nd- and 3rd-order attacks of 0.21 bpc.

2020 ◽  
Vol 10 (3) ◽  
pp. 836 ◽  
Author(s):  
Soo-Mok Jung ◽  
Byung-Won On

In this paper, we proposed methods to accurately predict pixel values by effectively using local similarity, curved surface characteristics, and edge characteristics present in an image. Furthermore, to hide more confidential data in a cover image using the prediction image composed of precisely predicted pixel values, we proposed an effective data hiding technique that applied the prediction image to the conventional reversible data hiding technique. Precise prediction of pixel values greatly increases the frequency at the peak point in the histogram of the difference sequence generated using the cover and prediction images. This considerably increases the amount of confidential data that can be hidden in the cover image. The proposed reversible data hiding algorithm (ARDHA) can hide up to 24.5% more confidential data than the existing algorithm. Moreover, it is not possible to determine the presence of hidden confidential data in stego-images, as they possess excellent visual quality. The confidential data can be extracted from the stego-image without loss, and the original cover image can be restored from the stego-image without distortion. Therefore, the proposed algorithm can be effectively used in digital image watermarking, military, and medical applications.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


2020 ◽  
Vol 5 (2) ◽  
pp. 100
Author(s):  
Dedi Darwis ◽  
A. Ferico Octaviansyah Pasaribu

<em>Keamanan data saat ini merupakan hal yang sangat penting diera digital karena komunikasi harus bersifat rahasia dan aman. Salah satu cara untuk berkomunikasi secara digital adalah steganografi yaitu pengembangan dari kriptografi, teknik ini memiliki cara menyembunyikan data dan informasi pada media lainnya misalkan seperti citra digital karena media ini sering digunakan dalam pertukaran informasi dan data. Algoritma steganografi yang digunakan pada penelitian ini adalah Discrete Wavelet Transform (DWT) dan Singular Value Decomposition (SVD) kedua metode ini merupakan bagian dari steganografi yang sama-sama memanfaatkan domain transform pada pengolahan citra digital dan memiliki kecepatan yang tinggi dalam penyisipan pesan rahasia ke suatu gambar. Masalah yang selama ini terjadi pada steganografi adalah kualitas stego image yang dihasilkan pada steganografi mengalami perubahan pada kualitas citra, sehingga perbedaan antara cover image dan stego image akan sangat terlihat. Penerapan metode DWT dan SVD pada penelitian ini diimplementasikan dengan bahasa pemrograman Python 2. Berdasarkan hasil pengujian yang dilakukan metode DWT dapat menghasilkan kualitas citra pada stego image yang lebih baik jika dibandingkan metode SVD yaitu menghasilkan nilai MSE nilai rata-rata 0,0046 db. Hasil perhitungan nilai PSNR juga membuktikan bahwa metode DWT menghasilkan kualitas citra  lebih baik dari dari metode SVD yaitu menghasilkan nilai rata-rata 63,47 db.</em>


Author(s):  
Oluwaseun M. Alade ◽  
Elizabeth A. Amusan ◽  
Oluyinka T. Adedeji ◽  
Oluwaseun O. Alo

Steganography deals with the ways of hiding communicated data in such a way that it remains confidential. Finding best position inside cover image to embed text message, maintaining a reasonable trade-off between security, robustness, higher bit embedding rate and imperceptibility are some of the challenges of steganography system. Hence, this paper presents firefly algorithm for finding best positions inside cover image in order to embed text message into cover image using Pixel Value Differencing (PVD) technique. Four different cover image was used. Experimental result showed the cover image with selected location using firefly algorithm as well as the stego image using PVD technique. The stego image was evaluated using Peak Signal to Noise Ratio (PSNR) and Mean square Error (MSE).  Firefly Algorithm with PVD technique produced a promising result for image steganography.


Author(s):  
Ratna Astuti Nugrahaeni ◽  
R. Rumani M. R. Rumani M. ◽  
Surya Michrandi Nasution

This journal explains about implementation that combine both cryptography and steganography method for texton cover image to increase the security level. Text will be encrypted with AES algorithm, and then it will be embedded to the cover image using F5 algorithm. The implemented AES algorithm has a good performance, with Avalanche Effect value ranges from 0.43 � 0.59. The resulting image, or stego image, has a very similar histogram with the original image, so there is no significant difference between the two of them. However, the file size change about 1.25 � 3.25 times larger than theoriginal image. If noise or disruption is given to stego image, the information can not be extracted.Keywords: cryptography, steganography, AES, F5


2017 ◽  
Vol 4 (1) ◽  
pp. 31
Author(s):  
Yuri Arianto ◽  
Rizky Ardiansyah ◽  
Rachmad Jibril Al Kautsar
Keyword(s):  

Keamanan informasi dapat berupa menyembunyikan atau mengubah informasi. Dalam penelitian ini diterapkan cara mengamankan informasi dengan menyembunyikan informasi kedalam sebuah wadah seperti image, vidio dan audio, Teknik ini disebut Steganografi. Pada steganografi terdapat banyak metode yang dapat digunakan, kali ini Peneliti menggunakan metode Bit Plane Complexity Segmentation (BPCS). Pada metode BPCS informasi atau pesan disisipkan pada daerah bit plane yang mengandung noise. Metode ini memanfaatkan pengelihatan manusia yang tidak dapat melihat perubahan biner pada gambar. Pada penelitian ini Cover image yang digunakan adalah citra dengan format JPG, PNG, dan BMP. Sedangkan pesan yang disimpan kedalam citra berupa file dengan format .txt dan .docx. Proses pengujian dilakukan dengan menyisipkan file kedalam beberapa Cover image menggunakan aplikasi yang telah dibangun. Hasil pengujian menghasilkan stego image dengan nilai rata-rata PSNR antara 22 - 25 dB. Sedangkan rata-rata penyisipan pesan sebesar 40%. Penerapan teknik steganografi bermanfaat untuk menyembunyikan pesan dalam suatu media tanpa terdeteksi oleh pengelihatan manusia secara kasat mata.


Author(s):  
Sa’ed Abed ◽  
Suood Abdulaziz Al-Roomi ◽  
Mohammad Al-Shayeji

AbstractIn steganography, the cover medium is widely treated as a mere container for the embedded information, even though it affects the stego-image quality, security, and robustness. In addition, there is no consensus on the characteristics of a suitable cover image. In this work, we introduce and practically prove the most suitable cover image (MSCI) framework to automatically select a cover image for a given secret image. This paper proposes choosing the most suitable cover from a set of images based on two steps. First, a set of cover images is filtered based on relative entropy and a histogram in order to identify the most suitable candidates. Second, the local block pixel intensity features of the candidates are analyzed to select the most suitable cover image. Furthermore, cover image local blocks were optimized, using rotation and flipping, during the embedding process to further improve stego-image representation. The proposed framework demonstrated high visual image quality when compared with existing solutions. Steganalysis tests indicated that the proposed solution for cover selection provided an increased resistance to modern steganalyzers with up to 30% lowered detection rate, which improved security.


2013 ◽  
Vol 2013 ◽  
pp. 1-11
Author(s):  
Jiann-Der Lee ◽  
Yaw-Hwang Chiou ◽  
Jing-Ming Guo

A novel reversible data-hiding scheme is proposed to embed secret data into a side-matched-vector-quantization- (SMVQ-) compressed image and achieve lossless reconstruction of a vector-quantization- (VQ-) compressed image. The rather random distributed histogram of a VQ-compressed image can be relocated to locations close to zero by SMVQ prediction. With this strategy, fewer bits can be utilized to encode SMVQ indices with very small values. Moreover, no indicator is required to encode these indices, which yields extrahiding space to hide secret data. Hence, high embedding capacity and low bit rate scenarios are deposited. More specifically, in terms of the embedding rate, the bit rate, and the embedding capacity, experimental results show that the performance of the proposed scheme is superior to those of the former data hiding schemes for VQ-based, VQ/SMVQ-based, and search-order-coding- (SOC-) based compressed images.


Sign in / Sign up

Export Citation Format

Share Document