ArticlePDF Available

A Better RGB Channel Based Image Steganography Technique

Authors:

Abstract and Figures

In this paper a new RGB channel based steganographic technique is proposed. The RSA algorithm is used for encryption and decryption. In a RGB image each pixel (24 bits) is having R-channel 8 bits, G-channel 8 bits and B-channel 8 bits. R, G and B stands for red, green and blue respectively. Out of these three channels, the one which is having the maximum value summed over for all the pixels will be decided as the indicator channel. Out of the remaining two channels (say channel1 and channel2) in each pixel, one channel is used for embedding four bits of the cipher text, depending on its value satisfying one of the four defined conditions. At the receiver side the reverse operation will be performed to retrieve the message. The experimental results show that the performance of this technique is satisfactory.
Content may be subject to copyright.
P.V. Krishna, M.R. Babu, and E. Ariwa (Eds.): ObCom 2011, Part II, CCIS 270, pp. 470–478, 2012.
© Springer-Verlag Berlin Heidelberg 2012
A Better RGB Channel Based Image Steganography
Technique
Gandharba Swain1 and Saroj Kumar Lenka2
1 Research Scholar-CSE, Siksha ‘O’ Anusandhan University,
Bhubaneswar-751030, Odisha, India
gswain1234@gmail.com
2 Professor, Department of CSE, MITS University,
Lakshmangarh-332311, Rajasthan, India
lenka.sarojkumar@gmail.com
Abstract. In this paper a new RGB channel based steganographic technique is
proposed. The RSA algorithm is used for encryption and decryption. In a RGB
image each pixel (24 bits) is having R-channel 8 bits, G-channel 8 bits and B-
channel 8 bits. R, G and B stands for red, green and blue respectively. Out of
these three channels, the one which is having the maximum value summed over
for all the pixels will be decided as the indicator channel. Out of the remaining
two channels (say channel1 and channel2) in each pixel, one channel is used for
embedding four bits of the cipher text, depending on its value satisfying one of
the four defined conditions. At the receiver side the reverse operation will be
performed to retrieve the message. The experimental results show that the
performance of this technique is satisfactory.
Keywords: Steganography, cryptography, encryption, decryption, RGB,
channel based, RSA.
1 Introduction
Steganography is a technique for secret communication between two parties. In
steganography the secret information is hidden inside a carrier file such that the
change in appearance of the carrier file should not be apparent to normal human eye.
If we use cryptography with in steganography the security becomes two fold.
The word steganography is originally derived from Greek words Steganos which
means “covered” and Graptos which mean “writing”. It has been used in various
forms for thousands of years. In Ancient Greece they used to select messengers and
shave their head, they would then write a message on their head. Once the message
had been written the hair was allowed to grow back. After the hair grew back the
messenger was sent to deliver the message, the recipient would shave off the
messengers hair to see the secret message. During world war-2 also this concept was
used. With the boost in computer power, the internet and with the development of
digital signal processing (DSP), information theory and coding theory, steganography
A Better RGB Channel Based Image Steganography Technique 471
has gone digital. In the realm of this digital world steganography has created an
atmosphere of corporate vigilance that has spawned various interesting applications,
thus it is continuously evolving.
Steganography can be categorized into four categories [1]. Those are:
Steganography in image, steganography in audio, steganography in video and
steganography in text. The image steganography algorithms can be categorized into
two categories, namely, spatial domain and frequency domain. In each of these
categories we can have adaptive and dynamic methods. Adaptive methods are image
statistics based, where as dynamic methods are message bit dependent.
When hiding information inside images usually Least Significant Bit (LSB)
method is used. In the LSB method the 8th bit of every byte of the carrier file is
substituted by one bit of the secret information. This method works fine in the image
carriers because if the least significant bit is changed from 0 to 1 or vice versa, there
is hardly any change in the appearance of the color of that pixel. The LSB method
usually does not increase the file size, but depending on the size of the information
that is to be hidden inside the file, the file can become noticeably distorted. Instead of
hiding a fixed number of bits in the LSBs of each pixel, one can also embed different
number of bits in LSBs of different pixels based on pixel value range calculation [2].
In [3] a two way block matching procedure and the hop embedding scheme is
proposed to embed a secret image inside a cover image. Kumar and Roopa proposed
the same block matching procedure and the hop embedding scheme with improved
tamper proofing, so that it is not possible for any intruder to modify the content of the
embedded data in the cover image [4].
In general if the pixels are located in edge areas they can tolerate larger changes
than those in smooth areas. The range of changeable pixel value in smooth areas is
small, where as in edge areas it is large, so that the stego image maintains a good
perceptual quality. Wu and Tsai [5] proposed a pixel value differencing method,
where a cover image is partitioned into non overlapping blocks of two consecutive
pixels. A difference value is calculated from the value of the two pixels in each block.
Secret data is embedded into a cover image by replacing the difference values of the
two pixel blocks of the cover image with similar ones, in which bits of embedded data
are included. Zhang and Wang [6] found that pixel value differencing steganography
is vulnerable to histogram based attacks and proposed a modification for enhanced
security. Chang and Tseng [7] employed two sided, three sided and four sided side
match schemes. The two sided side match method uses the information of the upper
and left neighboring pixels in order to make estimates. The three sided side match
method utilizes upper and left neighboring pixels; and one of the other neighboring
pixels. The four sided match method uses the upper, left, right and below neighbors.
In RGB images each pixel is represented by 3 bytes to represent the intensities of
red, green and blue channels in that pixel. Parvez and Gutub [8] presented a technique
based on RGB intensity values of the pixel. They took one of the channels as
indicator channel and used one or both of the remaining two channels to conceal data
bits. The last two bits of the indicator channel tells whether the data bits are hidden in
the other two channels or not. In [9] Tiwari and Shandilya proposed two techniques
based on RGB concept. In the first technique they modified the technique of Pervez
472 G. Swain and S. Kumar Lenka
and Gutub, by changing the indicator for every subsequent pixels. The second
technique is a random number generation based, in which a random number generated
determines the number of least significant bits that is used to hide the secret data. In
[10] Kaur et al. proposed a RGB based technique in which embedding was done upto
4 bits in the channels other than the indicator channel based upon the last four bits of
the indicator channel.
In [8] an RGB based algorithm is proposed where the indicator channel is
randomly chosen, and 2 bits are embedded in a channel other than the indicator. In
this proposed algorithm the indicator channel is chosen based on the sum of color
values and embedding is done, as 4 bits in each selected channel satisfying some
conditions. In section-2 the proposed algorithm is discussed. In section-3 the
experimental results are narrated and in section-4 the paper is concluded.
2 RGB Channel Based Steganography
2.1 Algorithm at Sender
Step-1: Receive the secret message. Apply RSA Algorithm and convert it to cipher
text. Now get it in binary.
Step-2: Receive the RGB Image. Convert to binary. Calculate the sum of R channels
of all the pixels, sum of G channels of all the pixels and sum of B channels of
all the pixels. The channel having maximum sum is the indicator channel. Four
bit data is to be hidden in one of the channels other than the indicator, in the
following manner.
Step-3: Suppose, the two channels other than the indicator channel are channel1 and
channel2.
If R is the Indicator channel, then G is channel1 and B is channel2.
If G is the Indicator channel, then R is channel1 and B is channel2.
If B is the Indicator channel, then R is channel1 and G is channel2.
Step-4: Divide the cipher text into groups of four bits each.
Step-5: Take the next pixel, take the next four bits of cipher text. Do any of the
following 4 sub steps.
(a). If (channel1 value 63 and channel2 value > 63) Embed the 4 bits of
cipher in channel1 and set 8th bit of indicator channel to 0.
(b). If (channel1 value > 63 and channel2 value 63) Embed the 4 bits of
cipher in channel2 and set 8th bit of indicator channel to 1.
(c). If (Channel1 value 63 and channel2 value 63)
Then, If Channel1 value Channel2 value, Embed in channel1 and set 8th bit
of indicator channel to 0. Otherwise Embed in channel2 and set 8th bit of
indicator channel to 1.
(d). If Channel1 value > 63 and channel2 value > 63) do not embed in this
pixel.
Step-6: If embedding of cipher text is not yet over go to step-5.
Step-7: Stop
A Better RGB Channel Based Image Steganography Technique 473
Table 1. Example of embedding
As an example suppose we have the three pixels as in table1 and the Green channel
is the indicator channel. Suppose the cipher text stream is: 0010 1010 1111 0000. In
pixel1 channel1 is 10010110 = 150 which is greater than 63 and channel2 is
00011110 = 30 which is less than 63. Thus the four bits of cipher 0010 is embedded at
4 LSBs of channnel2 and the 8th bit of indicator is set to 1, it becomes 10001111. In
pixel2 channel1 is less than 63 and channel2 is greater than 63, the next 4 cipher bits
i.e, 1010 are embedded in channel1 and 8th bit of indicator is set to 0, it becomes
01010100. In pixel3 both the channel1 and channel2 are greater than 63, so no
embedding is done. After embedding the pixels are also shown in table1.
Now you may question that if we are changing the last 4 bits of a channel, its value
will change a lot, how does it work? Look at table2. The channel having decimal
value in range 0 to 15, if we change the last 4 bits its value will also fall in range 0 to
15. Similarly the channel having decimal value in range 16 to 31, if we change the
last 4 bits its value will also fall in range 16 to 31. The channel having decimal value
in range 32 to 47, if we change the last 4 bits its value will also fall in range 32 to 47
and the channel having decimal value in range 48 to 63, if we change the last 4 bits its
value will also fall in range 48 to 63. Thus a channel value will suffer a maximum
displacement of 16, which will not make much change in the total pixel value which
is 24 bits.
2.2 Algorithm at Receiver
Step-1: Receive the Stego Image. Transform to binary. Detect the indicator channel;
this information is hidden in some reserved location of stego image. Detect the
starting pixel and ending pixel locations with in which the cipher is embedded,
these information is also hidden in the reserved location of the image.
Step-2: Suppose, the two channels other than the indicator channel are channel1 and
channel2.
If R is the Indicator channel, then G is channel1 and B is channel2.
If G is the Indicator channel, then R is channel1 and B is channel2.
If B is the Indicator channel, then R is channel1 and G is channel2.
Step-3: Begin with start pixel (from where embedding continues)
Before Embedding After Embedding
Red
(Channel1)
Green
(Indicator
Channel)
Blue
(Channel2)
Red
(Channel1)
Green
(Indicator
Channel)
Blue
(Channel2)
Pixel1 10010110 10001110 00011110 10010110 10001111 00010010
Pixel2 00001111 01010101 11001100 00001010 01010100 11001100
Pixel3 10111101 11110000 11001100 10111101 11110000 11001100
474 G. Swain and S. Kumar Lenka
Step-4: If both channel1 value and channel2 value are > 63 skip this pixel and go to
step-5, otherwise do sub step 4(a) and go to step-5.
(a). If 8th bit of indicator channel is 0, take last four bits of channel1, otherwise
take the last four bits of channel2. Concatenate these 4 bits to a variable named
as CIPHER. Initially the variable CIPHER is blank.
Step-5: Take the next pixel. If it is the pixel following the end marker (it is the last
pixel up to which embedding is done), go to step-6, otherwise go to step-4.
Step-6: Now apply RSA algorithm to decrypt the cipher text stored in the variable
CIPHER.
Step-7: Stop
Table 2. Change in value of a channel after changing it’s last 4 bits
Channel value Channel value after changing its 4 LSBs
00000000
00000001or 00000010 or 00000011 or 00000100 or 00000101 or
00000110 or 00000111 or 00001000 or 00001001 or 00001010 or
00001011 or 00001100 or 00001101 or 00001110 or 00001111
0 Channel value 0 changes to 1 or 2 or 3 or 4 or 5 or 6 or 7 or 8 or 9 or 10
or 11 or 12 or 13 or 14 or 15
00000001
00000000 or 00000010 or 00000011 or 00000100 or 00000101 or
00000110 or 00000111 or 00001000 or 00001001 or 00001010 or
00001011 or 00001100 or 00001101 or 00001110 or 00001111
1 Channel value 1 changes to 0 or 2 or 3 or 4 or 5 or 6 or 7 or 8 or 9 or 10
or 11 or 12 or 13 or 14 or 15
00000010
00000000 or 00000001 or 00000011 or 00000100 or 00000101 or
00000110 or 00000111 or 00001000 or 00001001 or 00001010 or
00001011 or 00001100 or 00001101 or 00001110 or 00001111
2 Channel value 2 changes to 0 or 1 or 3 or 4 or 5 or 6 or 7 or 8 or 9 or 10
or 11 or 12 or 13 or 14 or 15
… …
00001111
00000000 or 00000001or 00000010 or 00000011 or 00000100 or
00000101 or 00000110 or 00000111 or 00001000 or 00001001 or
00001010 or 00001011 or 00001100 or 00001101 or 00001110
15 Channel value 15 changes to 0 or 1 or 2 or 3 or 4 or 5 or 6 or 7 or 8 or 9
or 10 or 11 or 12 or 13 or 14
3 Results and Discussion
The technique is experimented and results are observed for more than 50 images.
Some sample observations are shown. In fig.1, (a) is the original Statue image and (b)
is it’s stego image with 20027 bytes of cipher data embedded in it, (c) is the original
Player image and (d) is it’s stego image with 30116 bytes of cipher data embedded
into it. Similarly, (e) is the original Leena image and (f) is it’s stego image with 30079
bytes of cipher data embedded into it. If you see the stego images, you can not
observe any change in quality.
A Better RGB Channel Based Image Steganography Technique 475
(a). Original Statue image (b). Stego Statue image
(c ). Original Player image (d). Stego Player image
(e). Original Leena Image (f). Stego Leena image
Fig. 1. Original images and their stego images
Moreover, there are some basic notes that should be observed by a steganographer
[1]. Those are: (i) In order to eliminate the attack of comparing the original image
with the stego image, we can freshly create an image and destroy it after generating
476 G. Swain and S. Kumar Lenka
the stego image. The images available in World Wide Web should not be used. (ii) In
order to avoid any human visual perceptual attack, the generated stego image must
not have visual artifacts. (iii) Smooth homogeneous areas must be avoided, e.g.,
cloudless blue sky over a blanket of snow, and however chaotic areas with naturally
noisy back grounds and salient rigid edges can be targeted. (iv) The secret data must
be a composite of balanced bit values, since in general; the expected probabilities of
bit 0 and 1 for a typical cover image are the same. In such cases encryption provides
such a balance.
The performance of various steganographic methods can be rated by the three
parameters: security, capacity, and imperceptibility [11]. Security: Steganography
may suffer from many active or passive attacks, thus a secured steganographic
algorithm should survive from passive or active attacks. Capacity: Capacity means the
amount of information that can be hidden. To be useful in conveying secret message,
the hiding capacity provided by steganography should be as high as possible, which
may be given in measurements such as the size of secret message, or bits per pixel
etc. Imperceptibility: Stego images should not have severe visual artifacts. It means
the resultant image should look innocuous enough.
This proposed algorithm is also a secured one. Table 3 represents the peak signal to
noise ratio (PSNR) with different message length for different images. PSNR is
measured in decibels (dB). PSNR values falling below 30 dB indicate a fairly low
quality, i.e., distortion caused by embedding can be obvious; however, a high quality
stego-image should strive for atleast 40 dB [1]. The PSNR is as defined below.
PSNR= 10 log 10
2
max
C
MSE



,
Where Cmax = the maximum pixel value which is 255 for 8-bit images. MSE called the
mean square error is as defined below.
MSE = 1
MN
()
MN
xy xy
x1y1
S C
==
 ,
Where x and y are the image coordinates, M and N are the dimensions of the image,
Cxy is the cover image and Sxy is the generated stego image.
Table 3. Observed PSNR for various images with different Payload
Image Image size
KBs
Maximum
embedding capacity
(bits)
Amount of
cipher
embedded
(bytes)
PSNR
(dBs)
Statue 1433 1626288
(198.52 KB)
20027 47.84
Leena 768 1003028
(122.44 KB)
30079 42.75
Player 3290 3720284
(454.14 KB)
30116 49.61
A Better RGB Channel Based Image Steganography Technique 477
The capacity is very high, in Statue image it is 198.52 kilo bytes which is 14% of
the image size. In Leena image it is 122.44 kilo bytes which is 16% of the image size.
In Player image it is 454.14 kilo bytes which is 14% of the image size.
If you can observe the stego images in fig.1, you can not find any visual artifacts,
showing the presence of steganography.
The table 4 shows the comparison of our proposed scheme with the different
algorithms proposed by other researchers. Compared to other algorithms suggested by
different experts in this field; this is also a stronger one.
Table 4. Comparision with other schemes
Scheme
Mimimum
Observed
PSNR
Capacity Imperceptibility
Wang and Chen. [3] 44.20 high good
Kumar and Roopa [4] 44.15 medium good
Wu and Tsai [5] 37.90 medium good
Zhang and Wang [6] 36.00 medium good
Chang and Tseng [7] 33.53 medium good
Proposed Scheme 42.75 high good
4 Conclusion
In this paper a new RGB based steganography is proposed. It provides two levels of
security, one at cryptography level and the other at steganography level. The
embedding capacity is very high. The channels where data is embedded is different
for different pixels, it will make the intrusion difficult. The proposed scheme is a
novel approach. This technique is one of the efficient approaches. Capacity and PSNR
is better as compared to some of the existing algorithms. No visual artifacts can be
observed from the corresponding stego images.
Acknowledgments. Gandharba Swain is working as an Associate Professor in GMR
Institute of Technology. He would like to thank the management of GMR Institute of
Technology for providing the necessary computing facilities.
References
1. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital Image Steganography: Survey
and Analysis of Current Methods. Signal Processing 90, 727–752 (2010)
2. Jain, Y.K., Ahirwal, R.R.: A Novel Image Steganography Method with Adaptive Number
of Least Significant Bits Modification Based on Private Stego Keys. International Journal
of Computer Science and Security 4(1), 40–49 (2010)
478 G. Swain and S. Kumar Lenka
3. Wang, R., Chen, Y.: High Payload Image Steganography Using Two-Way Block
Matching. IEEE Signal Processing Letters 13(3), 161–164 (2006)
4. Kumar, P.M., Roopa, D.: An Image Steganography Framework with Improved Tamper
Proofing. Asian Journal of Information Technology 6(10), 1023–1029 (2007)
5. Wu, D.C., Tsai, W.H.: A Steganograhic Method for Images by Pixel Value Differencing.
Pattern Recognition Letters 24(9-10), 1613–1626 (2003)
6. Zhang, X., Wang, S.: Vulnerability of Pixel-Value Differencing Steganography to
Histogram Analysis and Modification for Enhanced Security. Pattern Recognition
Letters 25, 331–339 (2004)
7. Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side
Match. Pattern Recognition Letters 25(12), 1431–1437 (2004)
8. Parvez, M.T., Gutub, A.A.: RGB Based Variable-Bits Image Steganography. In:
Proceedings of IEEE Asia Pacific Services Computing Conference, pp. 1322–1327 (2008)
9. Tiwari, N., Shandilya, M.: Secure RGB Image Steganography from Pixel Indicator to
Triple Algorithm- An Incremental Growth. International Journal of Security and Its
Applications 4(4), 53–62 (2010)
10. Kaur, M., Gupta, S., Sandhu, P.S., Kaur, J.: A Dynamic RGB Intensity Based
Steganography Scheme. World Academy of Science, Engineering and Technology 67,
833–838 (2010)
11. Li, B., He, J., Huang, J., She, Y.Q.: A Survey on Image Steganography and Steganalysis.
Journal of Information hiding and Multimedia Signal Processing 2(2), 142–172 (2011)
... As well as gives good capacity. Because of steganography concern in hiding secret message, it is important to select suitable cover image that secret message can store in it, it prefers cover image doesn't exist on website, because attacker can compare between original and stego image, also smooth region should be avoided [6]. ...
... A new RGB channel based steganography was proposed by Gandharba Swain and Saroj Kumar in (2012), it provides two levels of security, first at cryptography level and the second at steganography level. The message using a key that provide another level of security [6]. ...
Article
Full-text available
In this paper, a new steganography technique based on the similarity between cover RGB image and secret message is depended. Various steganography techniques have been proposed in literature. The Least Significant Bit steganography is one of them in which least significant bit of the image is replaced with data bit. This method is susceptible to steganography analysis and to make it more secure, in this research, cover Bmp image is divided into several blocks. These blocks can be tested to elicit blocks that are most closely resembling to a secret message, then in each block find out two channels that provide the highest similarity to secret message and consider the remaining channel as indicator. So the indicator may be different in each block. In each pixel of these extracted blocks, the indicator can be represented by one bits if there is no hidden data, otherwise, two bits are used, first bit to indicate there is embedded data, second bit to indicate to the channel that store larger number of bits. This method is more secure than conventional least significant bit method through changing sequential data storage style that the least significant bit technique uses, since secret message is divided into portions and each portion is stored into most similar block to it. So, this algorithm gives high peak signal to noise ratio for steganography image and also good capacity since each pixel containing hidden data stores five bits.
... Second, the random number generator was employed to estimate the secret bits to embed in the LSB of a pixel, where up to 4 LSBs can be embedded into the data channel. Further, G. Swain et al. [112] introduced a block based RGB indicator data embedding method that divided the image and secret data into each 8 blocks, where user defined key decided the one to one image and secret block mapping or relation. In embedding process, one channel was considered as indicator and others as data channels. ...
... GA. Tseng [31] Nguyen [32] Chakraborty [30] Liao [126] Jung [44] Lee [56] Hernández [61] Grajeda [63] Khodaei [53] Balasubramanian [57] Shen [60] Swain [62] Tsai [127] Kieu [67] Sun [72] Kuo [68] Shen [60] Chen Das [115] Mahimah [113] Abdullah [108] Roy [107] Sun [103] AL-Dmour [95] Jung [102] Ioannidou [98] Chen [39] Pan [93] Lu [92] Wu [75] Jafar [89] Chen [83] Hong [82] Muhammad [85] Swain [112] Qazanfari [24] Sarreshtedari [23] Yuan [35] EL-EMAM [124] EL-Emam [123] Fig . 9 Chronological orders of spatial domain steganographic techniques with their efficiencies ...
Article
Full-text available
This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy research in image steganography. Even though it is interesting to highlight that the existing embedding techniques may not be perfect, the objective of this paper is to provide a comprehensive survey and to highlight the pros and cons of existing up-to-date techniques for researchers that are involved in the designing of image steganographic system. In this article, the general structure of the steganographic system and classifications of image steganographic techniques with its properties in spatial domain are exploited. Furthermore, different performance matrices and steganalysis detection attacks are also discussed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.
... The first indicator channel was selected depending on the size of the secret message and the subsequent indicator channels were selected sequentially. Swain and Lenka [27] used a fixed indicator channel which was the maximum value summed for all the pixels. Their method encrypted the secret bits to add a second security layer to the pixel indicator technique in [13]. ...
Article
Full-text available
Data hiding technologies aim to hide the existence of secret information within digital covers such as images by causing unnoticeable degradation to their quality. Reducing the image distortion and increasing the embedding capacity are the main points that the data hiding techniques revolved around. This article proposes two high payload embedding methods with high stego image quality using the Hue-Saturation-Value (HSV) colour model. The first method is hue-based embedding (HBE) that employs the H plane for hiding one or two bits in non-grey pixels. The second method uses the three HSV components, so it is called three-planes embedding (TPE). In TPE, one bit is hidden in the least significant bit (LSB) of V of the grey pixels, one or two bits in H of the pixels having low saturation or low brightness and one bit in the LSB of S otherwise. The experiments were conducted on 25 images and the results show that HBE hides more data on average than TPE with its quality reaching 60 dB. TPE achieves quality up to 61 dB and capacity reaches 364 Kb. TPE scores the highest capacity among six state-of-the-art techniques in Red-Green-Blue, HSV, Hue-Saturation-Intensity and YCbCr spaces with the highest average peak signal to noise ratio midst five of them. By embedding 60, 90, and 120 Kb, this TPE attains the best average quality amid all the methods.
... X. Liao et al [9] proposed a similar method, but the edge region and flat region id decided by the difference between averages of four pixel blocks. Lenka et al [10] proposed a technique which is combination of both steganography and cryptography for better security. In a RGB image, there are three channels for storing information of each fundamental color. ...
... The secret message is converted using two kinds of plain text RSA plaintext and IDEA plain text. The authors in [6] proposed a technique which is a combination of both steganography and cryptography for better security of secret of information. In RGB image each pixel (24-bits) has R channels 8-bits; G channel 8-bits and B channel 8-bits. ...
Article
Full-text available
Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to be hiding in the cover image. Experimental results, obtained from different experimental tests, show that our proposed system proves to be more efficient than another steganography technique presented in literature and in comparison with the original cover image in terms of fidelity criteria and degradation quality of the .
... The input image is a lung patch 1. RGB three channels separation. we get the RGB vectors [46,47] of the pre-processed image c , c ∈ {R, G, B}. 2. Randomly generate the initial weight matrix of three channels ̂ init c , c ∈ {R, G, B} and orthogonalize the initial weight matrix. The Fig. 3 describes the whole architecture, which consists of four layers: input layer, hidden layer, connection layer and the output layer. ...
Article
Full-text available
The classification of histopathological images is a challenging task in the study of real-life medicine owing to the diverse geometrical structures and different histology features. This paper proposes a framework called Local Receptive Field based Extreme Learning Machine with Three Channels (3C-LRF-ELM), which can automatically extract histopathological features to diagnose whether there is a disease. We conduct experiments on the real-world image dataset that consists of mammalian lung, kidney and spleen organ images provided by the animal diagnostics lab (ADL) Pennsylvania State University. The training sets are consisted of overlapping blocks which are randomly extracted from arbitrary 40 images of each type image in the ADL dataset. The remaining images are equally divided into 850 blocks, and then they are given to the model 3C-LRF-ELM to generate the labels. The final label of each image is defined by the optimal threshold \(\alpha\). The 3C-LRF-ELM can be single layer network or multi-layer network. In this paper, considering the computational complexity, we choose the single layer 3C-LRF-ELM and two layers 3C-LRF-ELM structure to analyze the influence of the number of layers on the experimental results. The experimental results show that the single layer 3C-LRF-ELM structure is better than two layers 3C-LRF-ELM. Compared to the Discriminative Feature-oriented Dictionary Learning, the single layer 3C-LRF-ELM has a better classification performance.
Article
Full-text available
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related cryptographic primitives. Moreover, in the case of proprietary applications such as online social networks, users are at the mercy of the vendor’s security measures. Therefore, users are vulnerable to various security and privacy threats. Contrary to this, covert communication techniques hide the existence of communication and thus achieve security through obscurity and hidden communication channels. Over the period, there has been a significant advancement in this field. However, existing literature fails to encompass all the aspects of covert communications in a single document. This survey thus endeavors to highlight the latest trends in covert communication techniques, related challenges, and future directions.
Article
Full-text available
The aim of the paper is to find the distortion rates of the images by using Steganography. The cover and message images are scaled to 256 by 256 pixels. RGB level images are converted into HSI color space. HSI color space based metric establishes a better relationship with human perception for the processing. For the ‘message hiding’, the LSB Steganography method is utilized. In the image application, the least significant bit (LSB) data embedding is performed on the image. The effect of changing LSBs up to the 7th bit plane on the image has been examined with various quality metrics values like PSNR, SSIM, and MSE. Here we focus on the degradation level of the tested image to evaluate the effect of the RGB level image converted to the HSI color space, the altered effect of the original image on the data embedded image and calculate the image quality criteria.
Article
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal). This article has been withdrawn as part of the withdrawal of the Proceedings of the International Conference on Emerging Trends in Materials Science, Technology and Engineering (ICMSTE2K21). Subsequent to acceptance of these Proceedings papers by the responsible Guest Editors, Dr S. Sakthivel, Dr S. Karthikeyan and Dr I. A. Palani, several serious concerns arose regarding the integrity and veracity of the conference organisation and peer-review process. After a thorough investigation, the peer-review process was confirmed to fall beneath the high standards expected by Materials Today: Proceedings. The veracity of the conference also remains subject to serious doubt and therefore the entire Proceedings has been withdrawn in order to correct the scholarly record.
Chapter
Surface material classification has attracted a lot of attention from the academic and industrial communities. The surface material classification methods are for static object material data. However, in real industrial production, data cannot be generated overnight. It is generated continuously. In this work, we propose an algorithm named Multi-Scale Local Receptive Field Based Online Sequential Extreme Learning Machine (MSLRF-OSELM) for material classification, which not only can make dynamic training of networks by using data that are generated online of material images, but also can extract highly representative features from complex texture by multi-scale local receptive field. We conduct experiments on the public texture ALOT dataset and MNIST dataset. Experimental results verify the effectiveness of our algorithm and has good generalization performance.
Article
Full-text available
Steganography and steganalysis are important topics in information hiding. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. This paper provides a survey on steganography and steganalysis for digital images, mainly covering the fundamental concepts, the progress of steganographic methods for images in spatial representation and in JPEG format, and the development of the corresponding steganalytic schemes. Some commonly used strategies for improving steganographic se-curity and enhancing steganalytic capability are summarized and possible research trends are discussed.
Conference Paper
Full-text available
In this paper, we present a new algorithm for RGB image based steganography. Our algorithm introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel based on the actual color values of that pixel: lower color component stores higher number of bits. Our algorithm offers very high capacity for cover media compared to other existing algorithms. We present experimental results showing the superiority of our algorithm. We also present comparative results with other similar algorithms in image based steganography.
Article
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper we have investigate two methods of RGB image steganography one is pixel indicator technique and other is triple-A algorithem. They uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomization in selection of the number of bits used and the color channels that are used. This randomization is expected to increase the security of the system and also increase the capacity. These techniques can be applied to RGB images where each pixel is represented by three bytes to indicate the intensity of red, green, and blue in that pixel. This work showed attractive results especially in the capacity of the data-bits to be hidden with relation to the RGB image pixels.
Article
Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.
Article
A new and efficient steganographic method for embedding secret messages into a gray-valued cover image is proposed. In the process of embedding a secret message, a cover image is partitioned into non-overlapping blocks of two consecutive pixels. A difference value is calculated from the values of the two pixels in each block. All possible difference values are classified into a number of ranges. The selection of the range intervals is based on the characteristics of human vision’s sensitivity to gray value variations from smoothness to contrast. The difference value then is replaced by a new value to embed the value of a sub-stream of the secret message. The number of bits which can be embedded in a pixel pair is decided by the width of the range that the difference value belongs to. The method is designed in such a way that the modification is never out of the range interval. This method provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods. The embedded secret message can be extracted from the resulting stego-image without referencing the original cover image. Moreover, a pseudo-random mechanism may be used to achieve secrecy protection. Experimental results show the feasibility of the proposed method. Dual statistics attacks were also conducted to collect related data to show the security of the method.
Article
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science it can be used for ill intentions. It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed.
Article
In order to provide larger embedding capacity and to minimize the distortion of the stego-image, a novel steganographic method using side information is presented in this paper. The method exploits the correlation between neighboring pixels to estimate the degree of smoothness or contrast of pixels. If the pixel is located in edge area, then it may tolerate larger changes than those in smooth areas. The two-sided, three-sided, and four-sided side match methods are employed in our scheme. The experimental results show that our method provides a large embedding capacity without making noticeable distortion. Besides, the embedded data can be extracted from the stego-image without referencing the original image.
Article
The pixel-value differencing (PVD) steganography can embed a large amount of secret bits into a still image with high imperceptibility as it makes use of the characteristics of human vision sensitivity. However, a loophole exists in the PVD method. Unusual steps in the histogram of pixel differences reveal the presence of a secret message. An analyst can even estimate the length of hidden bits from the histogram. To enhance security, a modified scheme is proposed which avoids occurrence of the above-mentioned steps in the pixel difference histogram while preserving the advantage of low visual distortion of the PVD. The histogram-based steganalysis is therefore defeated.
Article
To enhance the embedding capacity of image steganography and provide animperceptible stego-image for human vision, a novel adaptive number of leastsignificant bits substitution method with private stego-key based on gray-levelranges are proposed in this paper. The new technique embeds binary bit streamin 24-bits color image (Blue channel) or in 8-bits gray-scale image. The methodalso verifies that whether the attacker has tried to modify the secret hidden (orstego-image also) information in the stego-image. The technique embeds thehidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity fromthe stego-image. Besides, the embedded confidential information can beextracted from stego-images without the assistance of original images. Theproposed method can embed 4.20 bits in each pixel of gray-scale image and4.15 bits in each pixel of color image. The presented method gives better resultsthan the existing methods.
Article
This letter presents a novel image steganography method that utilizes a two-way block-matching procedure to search for the highest similarity block for each block of the important image. The bases and indexes obtained together with some not-well-matched blocks are recorded in the least significant bits of the cover image using a hop scheme. The method exhibits a high data payload, which reduces the storage and transmission-time requirements and also provides a method that prevents an observer from selectively blocking the transmission of the important image.