We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Modulo Based Image Steganography Technique against Statistical and Histogram Analysis

Published on December 2011 by V. Nagaraj, Dr. V. Vijayalakshmi, Dr. G. Zayaraz
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 4
December 2011
Authors: V. Nagaraj, Dr. V. Vijayalakshmi, Dr. G. Zayaraz
22ebc3e8-6931-42bb-8afc-19aa7532781d

V. Nagaraj, Dr. V. Vijayalakshmi, Dr. G. Zayaraz . Modulo Based Image Steganography Technique against Statistical and Histogram Analysis. Network Security and Cryptography. NSC, 4 (December 2011), 34-39.

@article{
author = { V. Nagaraj, Dr. V. Vijayalakshmi, Dr. G. Zayaraz },
title = { Modulo Based Image Steganography Technique against Statistical and Histogram Analysis },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 34-39 },
numpages = 6,
url = { /specialissues/nsc/number4/4347-spe046t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A V. Nagaraj
%A Dr. V. Vijayalakshmi
%A Dr. G. Zayaraz
%T Modulo Based Image Steganography Technique against Statistical and Histogram Analysis
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 4
%P 34-39
%D 2011
%I International Journal of Computer Applications
Abstract

Steganography is the art and science of communicating secret data by embedding it into a multimedia carrier. The ultimate goal here is to conceal the very existence of the embedded data. Although the term Steganography has been known for thousands of years, its digital version came about only lately and research was intensified after the depressing event of Twin towers (11th Sep 2001). Steganalysis, which is the official counter attack science, defeats Steganographic algorithms whether they are based on the traditional spatial domain or the transform one. Steganography’s ultimate objectives, which are undetectability, robustness and capacity of the hidden data, are the main factors that separate it from other relating techniques, namely watermarking and cryptography. This paper focuses on improving the embedding capacity in steganography. For the improvement in the capacity, secret bits are encoded into cover image by three types of modulo functions. More specifically, to alleviate further color distortion and obtain a higher hiding capacity, the R, G and B component is encoded by Mod u, Mod v and Mod w functions respectively. Simulations were performed on cover images with different message sizes. The proposed technique showed that improved data hiding capacity in the cover image can be obtained without any compromise in histogram and statistical analysis. It also gives good perceptual quality in Stego image and greater security.

References
  1. F. Petioles, J. Anderson, and G. Kuhn, “Information hiding-A survey”, Proceeding of IEEE, special issues on multimedia content, vol. 87, no. 7, pp. 1062-1078, July 1999.
  2. W. Bender, D. Gruel, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no.3, pp.313-336, 1996.
  3. H. Farid, “Detecting hidden messages using higher-order statistical models”, Proceeding of IEEE, International conference on image processing, vol. 15, no.6, pp.68-72, Dec. 2002.
  4. J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images”, Magazine of IEEE Multimedia Special Issue on Security, vol no.8, issue 4.pp. 22-28, Nov. 2001.
  5. J. Fridrich and M. Goljan, “Practical Steganalysis of Digital Images – State of the Art”, Proceeding of SPIE, Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, pp. 1-13, Jan. 2002.
  6. W. Zhang, X. Zhang, and S. Wang, “A Double Layered “Plus-Minus One” Data Embedding Scheme”, Proceeding of IEEE signal processing letters, vol. 14, no. 11, Nov. 2007.
  7. A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems”, Proceedings of the third international workshop on Information Hiding, Springer Verlag, Sept. 2005.
  8. X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction”, IEEE Communication Lett., vol. 10, no. 11,pp. 781–783, Nov. 2006.
  9. H. Zhang and H. Tang, “A Novel image steganography algorithm against statistical analysis”, Machine Learning and Cybernetics, 2007 International Conference, vol. 19, no.22, pp.3884-3888, Aug.2007.
  10. J. Kang, Y. You, and M. Young Sung, “Steganography using Block-based Adaptive Threshold”, Proceeding of the Computer and information sciences, 2007, iscis 2007, 22nd international symposium, vol. 11, pp.234-241, Nov. 2007.
  11. N. Provos, “Defending against Statistical Steganalysis”, In 10th USENIX Security Symposium, Washington, Aug.2005.
  12. C.C. Thien and J.C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function”, Pattern Recognition, vol. 36, no. 12, pp.2875–2881, June 2003.
  13. C.M. Wang, N.I. Wu, C.S. Tsai, and M.S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” Journal of Systems and Software , vol.81, no. 1, pp. 150–158, Jan. 2007.
  14. J.C. Joo, H.Y. Lee, C. N. Bui, W.Y. Yoo, and H.K. Lee, “Steganalytic measures for the steganography using pixel-value differencing and modulus function,” in Proceeding s of the 9th Pacific Rim Conference on Multimedia, vol. 5353 of Lecture Notes in Computer Science , pp. 476–485, 2008.
  15. C.F. Lee and H.L Chen, “A novel data hiding scheme based on modulus function,” Journal of Systems and Software, vol. 83, no. 1, pp. 832–843, Dec. 2009.
  16. J.C. Joo, H.Y. Lee and H.Y. Lee, ”Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function”, EURASIP Journal on Advances in Signal Processing, Volume 2010, March 2010.
  17. S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111–119, March 2006.
  18. C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution “, Pattern Recognition Society, Published by Elsevier Ltd, vol. 37, pp 469 – 474, Aug. 2003.
  19. W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, June 2010.
  20. H. Yang, Xingming SUN and Guang SUN, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Radio Engineering, vol. 18, no. 4, Dec. 2009.
  21. Masoud Afrakhteh, Subariah Ibrahim,” Steganography Using More Surrounding Pixels”, Proceedings of the World Congress on Engineering 2010, Vol I , June 30 - July 2, 2010, London, U.K.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography adaptive algorithm spatial domain frequency domain security embedding payload