Conference PaperPDF Available

Cover Selection Steganography Method Based on Similarity of Image Blocks

Authors:

Abstract and Figures

An advantage of steganography, as opposed to other information hiding techniques, is that the embedder can select a cover image that results in the least detectable stego image. In a previously proposed method, a technique based on block texture similarity was introduced where blocks of cover image were replaced with the similar secret image blocks; then indices of secret image blocks were stored in cover image. In this method, the blocks of secret image are compared with blocks of a set of cover images and the image with most similar blocks to those of the secret image is selected as the best candidate to carry the secret image. Using appropriate features for comparing image blocks, guaranties higher quality of stego images and consequently, allows for higher embedding capacity, less delectability and, enhanced security. Based on this idea, in this paper, an adaptive cover selection steganography method is proposed, that uses statistical features of image blocks and their neighborhood. Using the block neighborhood information, we prevent appearing virtual edges in the sides and corners of the replaced blocks. Our method is examined with feature based and wavelet based steganalysis algorithms. The results prove the effectiveness and benefits of the proposed method.
Content may be subject to copyright.
Cover Selection Steganography Method Based on
Similarity of Image Blocks
Hedieh Sajedi, Mansour Jamzad
Computer Engineering Department, Sharif University of Technology
A_sajedi@ce.sharif.edu, Jamzad@sharif.edu
Abstract
An advantage of steganography, as opposed to
other information hiding techniques, is that the
embedder can select a cover image that results in the
least detectable stego image. In a previously proposed
method, a technique based on block texture similarity
was introduced where blocks of cover image were
replaced with the similar secret image blocks; then
indices of secret image blocks were stored in cover
image. In this method, the blocks of secret image are
compared with blocks of a set of cover images and the
image with most similar blocks to those of the secret
image is selected as the best candidate to carry the
secret image. Using appropriate features for
comparing image blocks, guaranties higher quality of
stego images and consequently, allows for higher
embedding capacity, less delectability and, enhanced
security. Based on this idea, in this paper, an adaptive
cover selection steganography method is proposed,
that uses statistical features of image blocks and their
neighborhood. Using the block neighborhood
information, we prevent appearing virtual edges in the
sides and corners of the replaced blocks. Our method
is examined with feature based and wavelet based
steganalysis algorithms. The results prove the
effectiveness and benefits of the proposed method.
1. Introduction
Steganography is the art and science of writing
hidden messages in such a way that no one, except the
intended recipient, knows of the existence of the
message. Consider that a transmitter consists of a host
image H, and the message M that a sender hopes to
communicate confidentially. The message can be text,
images, or anything that can be represented by a bit
stream. The host image H is used to embed the message
by using a stego-encoder controlled by a key K. The
key is a shared secret with the intended recipient whose
knowledge of the key enables him to decode the
message from the stego image. The decoding param-
eters are known to both sender and receiver as a shared
secret. The resulting stego image, SI = f (H,M,K), is
transmitted over a channel to the receiver where it is
processed by the stego-decoder using the same key K.
Successful steganography depends upon the carrier
medium not to attract attention. When presence of
stego-content is suspected, the main goal of
steganography is defeated [1]. There is a tradeoff
between the invisibility (imperceptible to naked eye)
and the amount of information that can be hidden in a
given cover image [2]. Steganographic security is
mostly influenced by the type of cover media; the
method for selection of places within the cover that
might be modified; the type of embedding operation;
and the number of embedding changes that is a quantity
closely related to the length of the embedded data.
Given two embedding schemes that share the first three
attributes, the scheme that introduces fewer embedding
changes will be less detectable. The rest of this section
reviews some of the existing proposed steganography
methods.
DCT domain embedding techniques are very
popular due to the fact that JPEG which is a DCT-
based image format is widely used in the public domain
in addition to being the most common output format of
digital cameras. Some of steganographic embedding in
DCT domain are Outguess [3],
F5 [4], model-based
[5], perturbed quantization (PQ) [6], and Matrix
embedding [7].
A cover selection method [9,10], like an image
retrieval method, retrieves images based on their fitness
to carry a given secret image. Cover selection problem
was studied in [10] by investigating three scenarios in
which the embedder has either no knowledge, partial
knowledge, or full knowledge of the steganalysis
technique. The main idea in [9] is based on dividing the
secret image into blocks of size 4×4 where for each
secret block, the most similar block in the host image is
IEEE 8th International Conference on Computer and Information Technology Workshops
978-0-7695-3242-4/08 $25.00 © 2008 IEEE
DOI 10.1109/CIT.2008.Workshops.34
379
found and the secret block is placed there. The host
image is found from an image database, in such a way
that it has the most number of similar blocks to those of
given secret image. To find the similarity between
blocks, they used texture analysis measures based on
Gabor filter. Then, the location addresses of the blocks
in host image which are replaced by blocks of secret
image are saved. Then, this data is converted to a bit
string and coded by Hamming code. This bit string is
embedded in determined DCT coefficients of the
modified host image and the blocks for embedding are
selected using a key which is the seed of a random
sequence generator. One of the advantages of this
method is increasing the embedding capacity by hiding
only blocks indices in DCT coefficients of host image.
One of the difficulties in texture based similarity
measure presented in [9] is that, they compare only the
content of two 4×4 blocks without considering the
effect of pixels in close neighborhood to the blocks.
Therefore, by replacing similar blocks with each other,
virtual edges may appear in borders and corners of a
replaced block.
In this paper to remove the blocking effect and
hence, improve the quality of stego images, we used
the neighborhood information beside block texture
information. Each block in the secret image is taken as
a texture pattern for which the most similar block is
found among the blocks of the host image. The
embedding procedure is carried on by replacing these
small blocks of the secret image with blocks in host
image in such a way that least distortion is imposed.
We have used block texture combined with
neighborhood information to measure the similarity of
blocks. Our experimental results showed a high level of
capacity and minimum distortion on images. In this
way, we present a method for image hiding that uses
the concept of block similarity between host and secret
images. We used texture information to obtain a mean
for summarizing the information of each image. Also
block neighborhood information is used to avoid
generating virtual edges and furthermore, K-means
algorithm is applied to improve the speed of finding the
best host image. The stego and restored secret images
have high quality and we verified that, using recent
powerful blind steganalyzers, one can not discriminate
between clean and stego images reliably.
In section 2, we introduce the proposed
steganographic method for gray level images.
Performance of the proposed technique is analyzed in
Section 3 and finally, section 4 outlines some
concluding remarks.
2. Proposed steganography method
Given a secret image, the proposed steganography
algorithm finds the best candidate host image from an
image database. Selecting the best cover is based on
the similarity of secret and cover image blocks. Like
the method which was proposed in [9], the main idea is
to find texture pattern blocks of the secret image, in the
host image, and save their addresses in host image.
Some statistical features of a block and its neighbor-
hood information are used to measure similarity of
image blocks. The structure for the proposed
steganography algorithm is shown in Figure 1.
2.1. Feature Extraction
Image properties such as image texture could be
used to categorize the images. The crude measures of
image texture would be the mean, variance, and
skewness of image blocks which are simple and can
efficiently be computed. In order to compute the
similarity between secret and cover images blocks, all
the images are divided into blocks of size 4×4. For
each block, the statistical values such as mean,
variance, skewness of 2×2 sub-blocks and, the
neighborhood information, as shown in Figure 2, are
calculated.
Four 2×2 sub-blocks are considered in up-right, up-
left, down-right and, down-left corners in a 4×4 block.
Figure 1. Selecting the best host image to cover a given secret image.
Feature
Extraction
Cover Image Database
Feature
Vectors
Cluster
Prototypes
4×4
Blocking
Feature
Extraction
Clustering
Secret
Image
4×4
Blocking
Selecting Best Host Image
Image
Database
Selected
Host Image
380
The average intensity value of four pixels that are
adjacent to each side of a 4×4 block, are computed and
considered as neighborhood information of that block
side. In this way, a 16 dimensional feature vector is
obtained (12 statistical values and 4 neighborhood
mean values). By searching a host image from image
database, the image which provides the best similarity
to the secret image will be selected.
2.2. Finding the best host image
Due to the existence of large number of feature vectors
for each image in the database an efficient method must
be used for indexing and searching the blocks.
Therefore, K-means is applied to each image of the
database to cluster feature vectors. For selecting a
block of host image, similar to a secret image block,
the feature vector extracted from the secret image is
compared to the cluster indices. The most similar block
is found from the cluster whose cluster prototype is the
nearest to the selected secret block feature vector.
For each block in secret image, its feature vector is
calculated and compared to cluster prototypes in
database. Each cluster prototype indicates the index of
a group of similar blocks. Having determined the most
similar cluster prototype, the most similar block is
searched in that cluster and is selected as the best
choice in this group. Euclidean distance is then applied
to measure the closeness of image blocks in database to
the blocks of secret image. This procedure is carried on
for all blocks of secret image and finally, the image
with the most number of similar blocks in database is
chosen to be the host image.
2.3. Encode and decode a secret image
After host image selection, we used the same approach
as in [9] to embed the secret image to the selected host
image that is as follows: Each block of secret image is
replaced with the most similar block to it in host image.
The positions of secret image blocks in host image are
saved. In next stage, the sequence of mentioned block
positions is changed to a bit string. Then a seed for
generating a random sequence of location addresses
(key) is considered.
Figure 2. Regions for computing features.
Figure 3. Middle DCT coefficients of an 8×8 block.
The position address bit string will be hided in middle
DCT coefficients of host image.
The way of doing steganography in the DCT
domain is to modulate the relative size of DCT
coefficients. The algorithm is described in [11] as
splitting the image into 8×8 blocks and calculating the
DCT of each block. Then two middle-frequency
coefficients are chosen and agreed upon by both send
and receive parties. A block encodes a 1 if
DCT(a,b) >
DCT(c,d)
and 0 otherwise.
In the encoding step, the coefficients are swapped if
their relative size does not match with the bit to be
encoded. Determined DCT coefficients are shown in
Figure 3.
The sender sends the modified stego image SI to the
recipient. Decoding is straightforward because the
recipient first forms the random sequence by using the
same key K and then, retrieves the embedded bit string
from the DCT coefficients of the blocks. The extracted
bit string is simply Hamming decoded and then indices
of the secret image blocks are extracted. Through the
knowledge of block indices, the secret image can be
reconstructed.
2.4. Steganalysis
Each steganalyzer is composed of feature extraction
and feature classification components. In this context,
two techniques which are studied in this work, take
distinct approaches in obtaining distinguishing statistics
from images. One of these techniques is wavelet-based
steganalysis (WBS) proposed by [12,13]. In feature
extraction part of this method, statistics such as mean,
variance, skewness, and kurtosis are calculated from
each wavelet decomposition subband. Additionally, the
same statistics are calculated for the error obtained
from a linear predictor of coefficient magnitudes of
each subband. Feature-based steganalysis (FBS) [17]
obtains a set of distinguishing features from the DCT
and spatial domains. It is shown in [16] that FBS
technique outperforms other techniques such as WBS
and binary similarity measures.
381
3. Experimental results
To examine the proposed method, different
experiments were done. Peak signal-to-noise ratio
(PSNR) given by the following formula is employed
for evaluation purposes:
MSE
L
PSNR
2
10
log10=
(1)
=
=
N
i
ii
xx
N
MSE
1
)(
1
(2)
L is the maximum gray level value and
i
x is the real
value of the pixel with
i
x being the pixel value after
modification and finally, N is the total number of
pixels.
3.1. Image database
We obtained a list of 330 JPEG images from some
typical images and some random ones from
Washington University image database [16]. The image
database contained cover images of size 256×256
where the secret images are of size 64×64. All images
were converted to grayscale and saved with quality
factor of 75. Each secret image was used to obtain a
stego dataset using the proposed technique.
3.2. Average capacity and Time complexity
evaluation
Fridrich in [17] showed that the average
steganographic capacity of grayscale JPEG images with
quality factor 70 is approximately 0.05 bits per non-
zero DCT coefficient. In the proposed method, each
64×64 size secret image has 256 blocks of size 4×4.
For embedding this secret image in a host image, we
should find 256 corresponding similar blocks. If each
host image size is 256×256, it has 4096 blocks of size
4×4. Therefore, for addressing 4096 blocks, we need
12 bit addresses. After applying Hamming code
algorithm, for each 4 bits, 7 bits, and totally, for
addressing each block 21 bits and for the whole 256
blocks, 5376 bits are needed. In this way, a 64×64
secret image is embedded in a 256×256 host image and
the embedding rate is 0.06 per bit. Experimental results
are carried out on a 2046 MB PIV processor using
MATLAB 7.1 and image processing toolbox 5.0.2. It
should be noted that MATLAB codes are usually 9 or
10 times slower than their C/C++ equivalents [18].
Table 1 shows the results of the time evaluation of the
proposed method.
Table 1. Average execution time.
Stage
Selecting Best
Host Image
Decoding
Time
Execution Time
4 Minutes 1 Second
3.3. Performance of selecting a host image
In this evaluation, we considered capacity,
perceived quality, and undelectability that are
presented in Figure 4. The figure shows the
performance of the proposed method on some
randomly selected secret images. Figure 4(b) is the best
candidate for the given secret image. Figure 4(c) and
4(d) show the host image in which the secret image is
hidden and the restored secret image, respectively.
From Figure 4(c), we can see that the quality of the
stego image is high, and unintended observers will not
be aware of the existence of a hidden image in it.
Indeed, it is impossible to distinguish between Figure
4(b) and (c) or between Figure 4(a) and (d) using naked
eye. This indicates that the value and normal usage of
the secret image are preserved. The average of PSNR
of the stego images is more than 39 dB which shows
that the cover images have excellent imperceptibility
after the secret image is embedded in them.
Table 2 shows the effect of using only block texture
information as suggested by [9] and using
neighborhood information as suggested by our method.
The results show that using neighborhood information
increases the quality of stego and restored secret image.
3.4. Steganalysis
In this section, we evaluate the security of the proposed
algorithm using two blind steganalyzers that use
features constructed in wavelet domain (WBS), and
features calculated in the DCT domain (FBS). In WBS,
a Fisher Linear Discriminator (FLD) and in FBS a
nonlinear Support Vector Machine (SVM) is trained to
discriminate clean and stego images. One hundred
images from database were chosen randomly for
testing, while the remaining images were used for
training. This partitioning was repeated a total of ten
times, with different random subsets used for training
and testing each time. For each of the ten partitions, the
SVM/FLD was trained with the statistics from the
training image subset. Finally, the trained classifier was
tested against the previously unseen images. The
average of detection accuracy is shown in Table 3.
As can be seen, the proposed method with payload
of approximately 0.067 bits per cover image bit can not
be reliably detected by any of the two steganalyzers.
382
Table 2. Comparison of stego and restored secret image PSNR with and without
considering neighborhood information.
Considering
neighborhood information
Average
Stego Image PSNR
Average Restored Secret
Image PSNR
No 36 34.5
Yes 39.5 35
Table 3. Blind steganalyzers detection accuracy.
Average Secret
Image Size
Average Cover
Image Size
Steganalyzer
False
Positives
True
Positives
Detection
Accuracy
WBS(FLD) 37.11% 53.77% 58.33%
4.3 KB 63.5 KB
FBS (Non-linear SVM) 44.6% 37.2% 46.3%
Secret Image(a)
Selected cover image
(b)
Stego Image(c)
Extracted secret
Image (d)
Size(KBytes)=4.25 Size(KBytes)=64.6 PSNR=39.50 PSNR=35.51
Size(KBytes)=4.26 Size(KBytes)=64.8 PSNR= 41.31 PSNR= 37.23
Size(KBytes)=4.25 Size(KBytes)= 64.6 PSNR= 39.62 PSNR= 36.36
Size(KBytes)=4.14 Size(KBytes)= 64.8 PSNR= 39.51 PSNR= 34.14
Figure 4. (a) Secret image. (b) Selected cover image. (c) PSNR Between the stego and cover
image. (d) PSNR between the original and extracted secret image (Units are in dB).
383
4. Conclusion
In this paper, we proposed a data hiding scheme that is
imperceptible while a big secret image is concealed in
a cover image. The main idea is based on dividing the
secret image into blocks and considering these blocks
as units for embedding. Then, using the similarity
measure, provided by feature vector, the most similar
block in the host image is found and the entire secret
block is replaced there.
Considering the neighborhood information of
blocks, prevents the method presented in [9] to
outbreak the virtual edges in sides and corners of
replaced blocks. The main achievements of the
proposed steganography method are: (i) reduction of
the host image distortion, and (ii) increased security. In
addition our method benefits from the advantages of
increasing the embedding capacity by hiding only
blocks indices (location addresses) in DCT coefficients
of host image as suggested in [9].
Our approach aims to reduce the risk of detection,
while keeping a high embedding capacity. This gain is
more important for long messages than for shorter ones
because longer messages are, in general, easier to
detect. We showed that cover selection method
provides good embedding efficiency and its relative
embedding capacity densely covers the range of large
payloads, making it suitable for practical applications.
The experimental results show that applying the
steganalysis methods on stego images can not reliably
detect stego and clean images.
5. References
[1] N.
Johnson, S. Jajodia, “Steganalysis of images created
using current steganography software”, in Proc. Int.
Workshop on Info. Hiding, Germany, 1998, pp. 273-289.
[2] G. Greg, “Steganalysis Gets Past the Hype”, IEEE
Distributed Sys. Online, April, 2005, vol. 6, no. 4, pp. 1-5.
[3] N. Provos, “Defending against statistical steganalysis”, in
Proc. 10th USENIX Security Symp., 2001.
[4] A. Westfeld, “F5-a steganographic algorithm: high
capacity despite better steganalysis”, in Proc. 4th Int.
Workshop on Info. Hiding, 2001.
[5] P. Sallee, “Model-based steganography”, in Proc. Int.
Workshop on Digital Watermarking, Seoul, Korea, 2003.
[6] J. Fridrich, M. Goljan, D. Soukal, “Perturbed
quantization steganography with wet paper codes”, in Proc.
ACM Multimedia Workshop, Germany, 2004.
[7] J. Fridrich, D. Soukal, “Matrix Embedding for Large
Payloads”, IEEE Trans. on Info. Forensics and Security, vol.
1, No. 3, 2006.
[8] P. Su, C. Kuo, “Steganography in JPEG 2000
compressed images”, IEEE Trans. Consum. Electron. 2003,
Vol. 49 Issue 54, 824–832.
[9] Z. Kermani, M. Jamzad, “A Robust Steganography
Algorithm Based On Texture Similarity Using Gabor Filter”,
IEEE Int. Symp. on signal processing and Info. Technology,
2005, pp. 578-582.
[10] M. Kharrazi, H. Sencar, N. Memon, “Cover Selection
for Steganograpic Embedding”, in Proc. ICIP, 2006, pp.117-
121.
[11] S. Katzenbeisser, F. Petitcolas, “Information Hiding
techniques for steganography and digital watermarking”,
2000, ISBN 1-58053-035-4.
[12] S. Lyu, H. Farid, “Detecting hidden messages using
higher-order statistics and support vector machines”, in Proc.
5th Int. Workshop on Info. Hiding, 2002.
[13] S. Lyu, H. Farid, “Steganalysis using color wavelet
statistics and one-class support vector machines”, in Proc.
SPIE 5306, 2004, pp. 35–45.
[14] J. Fridrich, “Feature-based steganalysis for jpeg images
and its implications for future design of steganographic
schemes”, in Proc. 6th Info. Hiding Workshop, Toronto,
2004.
[15] M. Kharrazi, H. Sencar, N. Memon, “Performance study
of common image steganography and steganalysis
techniques”, Journal of Electronic Imaging 15(4), 041104,
2006.
[16]http://www.cs.washington.edu/research/imagedatabase/g
roundtruth/
[17] J. Fridrich, T. Pevny, J. Kodovsky, “Statistically
Undetectable JPEG Steganography: Dead Ends, Challenges,
and Opportunities
, MM&Sec’07, Dallas, USA.ACM, 2007.
[18] K. Cho, J. Jang, K. Hong, “Adaptive skin-color filter”,
Pattern Recognition, 2001, Vol.34, Issue 5, pp. 1067-1073.
384
... As mentioned in Section I, it is hard to find a good trade-off between embedding capacity and security in many cases. To alleviate this problem, some researchers proposed cover selection algorithms [26]- [30] to select optimal cover images, so as to achieve more secure steganography. Sajedi et al. [26] selected the best cover images by comparing the similarity of secret and cover image blocks. ...
... To alleviate this problem, some researchers proposed cover selection algorithms [26]- [30] to select optimal cover images, so as to achieve more secure steganography. Sajedi et al. [26] selected the best cover images by comparing the similarity of secret and cover image blocks. The cover image sharing the highest number of similar blocks with the secret image was selected as the best candidate image for embedding secret messages. ...
Article
Full-text available
Steganography is an essential way to ensure secure communication in networks. Most steganographic algorithms imperceptibly embed secret information into an existing cover image. However, they generally cannot find a good trade-off between embedding capacity and security, as the existing covers available for users are usually far from optimal for embedding. To address this issue, instead of directly using the existing cover images, we propose a cover enhancement scheme for high-capacity image steganography, in which textured objects are generated and adaptively pasted to an existing cover based on the estimated embedding probability maps. Specifically, by estimating the embedding probability map of the cover image, we locate the high-embedding-cost region (HECR), which is inappropriate for embedding. Then, a textured object is generated by the conditional generative adversarial networks with the input of an affinely transformed object mask, and then is pasted to the located HECR for steganography. Since the image regions inappropriate for embedding are replaced by the textured object regions, the proposed scheme can provide a much higher embedding capacity for the state-of-the-art steganographic approaches. Extensive experiments demonstrate that the proposed scheme provides 2.5 times higher embedding capacity than state-of-the-art steganographic methods, and comparable anti-detectability to those methods.
... Currently, there exist a variety of cover selection techniques utilized in the field of steganography. These techniques encompass different methodologies, such as empirical selection based on changeable DCT (discrete cosine transform) coefficients [13], visual quality assessment [14], ratio of similar blocks [15], content complexity, and texture regions [16,17]. However, it is important to acknowledge that these empirical approaches do not demonstrate optimal undetectability when subjected to steganalysis. ...
Article
Full-text available
This paper proposes a new cover selection method for steganography. We focus on the scenario that the available images for selection contain diversified sources, i.e., nature images and metaverse images. For the scenario, we design a targeted strategy to evaluate the suitability for steganography of a candidate image, which selects images according to the undetectability against steganalytic tools symmetrically. Firstly, steganalytic features of the candidate images are extracted. Then, the features are fed on a steganalytic classifier, and the possibility of carrying secret data is calculated for cover selection. As a result, the selected images are the best candidates to resist steganalysis. Experimental results show that our method performs better than existing cover selection schemes when checked by steganalytic tools.
... If the criterion of a good cover file is met based on comparison parameters, the relevant cover file will be used as a carrier for the secret message. For image steganography, many studies have been introduced for cover image selection (Abdul Sattar & Talib Gaata, 2017;Hajduk & Levický, 2018;Sajedi & Jamzad, 2008;Shah & Bichkar, 2020;Wang et al., 2020;Wang & Zhang, 2019). The same goes for cover video selection in video steganography . ...
Article
Full-text available
Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selectionthat is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. As a trade-off exists between capacity and imperceptibility, producing a method focused on optimising both features is crucial. One ofthe search methods commonly used to find solutions for the trade-off problem in various fields is the Multi-Objective Evolutionary Algorithm (MOEA). Therefore, this research proposed a new method for optimising cover audio selection for audio steganography using the Non-dominated Sorting Genetic Algorithm-II (NSGA-II), which falls under the MOEA Pareto dominance paradigm. The proposed method provided suggestions for cover audio to users based on imperceptibility and capacity features. The sample difference calculation was initially formulated to determine the maximum capacity for each cover audio defined in the cover audio database. Next, NSGA-II was implemented to determine the optimised solutions based on the parameters provided by each chromosome. The experimental results demonstrated the effectiveness of the proposed method as it managed to dominate thesolutions from the previous method selected based on one criterion only. In addition, the proposed method considered that the trade-off managed to select the solution as the highest priority compared to the previous method, which put the same solution as low as 71 in the priority ranking. In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. It can be a response to help people whose computers and mobile devices continue to be unfamiliar with audio steganography in an age where information security is crucial.
... This will ultimately aid practical applications that make use of sufficient imperceptibility. Some of the earlier work relies on a correlation-based cover selection method, image block similarity (Sajedi and Jamzad 2008) and statistical measures features. ...
Article
Full-text available
Secret communication of sensitive data must progress in a trustworthy environment through data hiding. Using Mamdani fuzzy logic to identify color proximity at the block level and a shared secret key and post-processing system, this paper attempts to develop a robust data hiding scheme with similarity measures to ensure good visual quality, robustness, imperceptibility and enhance the security. In accordance with the Gestalt principle, proximity among the nearby objects is higher, whose value varies from expert to expert. Therefore, a possibility for type-I fuzzy logic to be used to evaluate proximity. Fuzzy proximity is computed by means of a difference in intensity (colordiff) and distance (closeness). Further, the block color proximity obtained from the proximity calculation network is graded using an interval threshold. Accordingly, data embedding is processed in the sequence generated by the shared secret keys. The tampering coincidence problem is solved through a post-processing approach to increase the quality and accuracy of the recovered secret message. The experimental analysis, steganalysis and comparisons clearly illustrate the effectiveness of the proposed scheme in terms of visual quality, structural similarity, recoverability and robustness.
... This will ultimately aid practical applications that make use of sufficient imperceptibility. Some of the earlier work relies on a correlation-based cover selection method, image block similarity (Sajedi and Jamzad, 2008) and statistical measures features. ...
Preprint
Full-text available
In 2020, Ashraf et al. proposed an interval type-2 fuzzy logic based block similarity calculation using color proximity relations of neighboring pixels in a steganographic scheme. Their method works well for detecting similarity, but it has drawbacks in terms of visual quality, imperceptibility, security, and robustness. Using Mamdani fuzzy logic to identify color proximity at the block level, as well as a shared secret key and post-processing system, this paper attempts to develop a robust data hiding scheme with similarity measure to ensure good visual quality, robustness, imperceptibility, and enhance the security. Further, the block color proximity is graded using an interval threshold. Accordingly, data embedding is processed in the sequence generated by the shared secret keys. In order to increase the quality and accuracy of the recovered secret message, the tampering coincidence problem is solved through a post-processing approach. The experimental analysis, steganalysis and comparisons clearly illustrate the effectiveness of the proposed scheme in terms of visual quality, structural similarity, recoverability and robustness.
Article
Full-text available
Covert channels are stealthy communication channels that enable manifold adversary and legitimate scenarios, ranging from malware communications to the exchange of confidential information by journalists and censorship circumvention. We introduce a new class of covert channels that we call history covert channels . We further present a new paradigm: covert channel amplification . All covert channels described until now need to craft seemingly legitimate flows or need to modify third-party flows, mimicking unsuspicious behavior. In contrast, history covert channels can communicate by pointing to unaltered legitimate traffic created by regular network nodes. Only a negligible fraction of the covert communication process requires the transfer of covert information by the covert channel's sender . This information can be sent through different protocols/channels. Our approach allows an amplification of the covert channel's message size, i.e., minimizing the fraction of actually transferred secret data by a covert channel's sender in relation to the overall secret data being exchanged. Further, we extend the current taxonomy for covert channels to show how history channels can be categorized. We describe multiple scenarios in which history covert channels can be realized, analyze the characteristics of these channels, and show how their configuration can be optimized.
Article
Existing cover selection methods for steganography mainly focus on embedding distortion of each image, but ignore the similarity between images. When the cover images are similar, a number of relevant samples are provided to steganalysis, which is disadvantageous to steganography. This paper proposes a new cover selection method to joint image similarity and embedding distortion. Due to the difference between steganography and other image processing tasks, e.g., image reconstruction, image recognition, we propose a customized method to calculate image similarity for steganography based on SVD (singular value decomposition). Importantly, the small singular values (instead of the large ones) are employed, since it is suitable for the properties of steganography. In addition, embedding distortion is calculated by the current distortion minimization framework. The obtained image similarity and embedding distortion are combined to form a new cover selection strategy. As a result, the properties of batch images can be fully used. Experimental results show that our scheme outperforms the state-of-the-art cover selection methods when they are checked by modern steganalytic tools.
Conference Paper
Full-text available
This paper presents an information-theoretic method for performing steganography and steganalysis using a statistical model of the cover medium. The methodology is general, and can be applied to virtually any type of media. It provides answers for some fundamental questions which have not been fully addressed by previous steganographic methods, such as how large a message can be hidden without risking detection by certain statistical methods, and how to achieve this maximum capacity. Current steganographic methods have been shown to be insecure against fairly simple statistical attacks. Using the model-based methodology, an example steganography method is proposed for JPEG images which achieves a higher embedding efficiency and message capacity than previous methods while remaining secure against first order statistical attacks.
Conference Paper
Full-text available
Steganographic messages can be embedded into digital images in ways that are imperceptible to the human eye. These messages, however, alter the underlying statistics of an image. We previously built statistical models using rst-and higher-order wavelet statistics, and employed a non-linear support vector machines (SVM) to detect steganographic messages. In this paper we extend these results to exploit color statistics, and show how a one-class SVM greatly simplies the training stage of the classier. In previous work,8, 11, 12 we showed that a statistical model based on rst-and higher-order wavelet statistics could discriminate between images with and without hidden messages. In this earlier work, we only considered grayscale images in order to simplify the computations. There is no doubt that strong statistical regularities exist between the color channels, and in this paper we extend our earlier statistical model to capture some of these regularities. In our previous work we used a (linear and non-linear) two-class support vector machine (SVM) to discriminate between the statistical features extracted from images with and without hidden messages. This classier required training from both cover and stego images. From the point of view of universal steganalysis, this training had the drawback of requiring exposure to images from broad range of stego tools. In this paper we employ a one-class SVM that obviates the need for training from stego images, thus making the training easier, and making it more likely that our classier will be able to contend with novel and yet to be developed stego programs. We will rst present the basic statistical model, and then describe the construction of a one-class support vector machine. We then show the eectiv eness of these tools in detecting hidden messages in tens of thousands of images, and from v e dieren t stego programs. We believe that this work brings us closer to realizing a robust tool for universal steganalysis.
Conference Paper
Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes an approach to detecting hidden messages in images that uses a wavelet-like decomposition to build higher-order statistical models of natural images. Support vector machines are then used to discriminate between untouched and adulterated images.
Book
Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography. This situation is, however, changing rapidly and the first academic conference on this topic was organized in 1996. The main driving force is concern over protecting copyright; as audio, video and other works become available in digital form, the ease with which perfect copies can be made may lead to large-scale unauthorized copying, and this is of great concern to the music, film, book and software publishing industries. At the same time, moves by various governments to restrict the availability of encryption services have motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. This book surveys recent research results in the fields of watermarking and steganography, two disciplines generally referred to as information hiding.
Article
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity. F5 implements matrix encoding to improve the efficiency of embedding. Thus it reduces the number of necessary changes. F5 employs permutative straddling to uniformly spread out the changes over the whole steganogram.
Article
The misuse of steganography, the technology of hiding messages in visible data, by terrorist organizations was discussed. Shortly before the terrorist attacks of 11 September 2001, the popular US newspaper, USA Today, featured a story in which US government officials claimed al Qaeda terrorists were using steganography to spread their plans via pornography Web sites and sports chat rooms. US intelligence agents also claiming it a virtual certainty that terrorists are using steganography. Legislators in several states have either considered or already passed laws prohibiting the use and dissemination of technology to conceal data.
Conference Paper
The primary goal of image steganography techniques has been to maximize embedding rate while minimizing the detectability of the resulting stego images against steganalysis techniques. However, one particular advantage of steganography, as opposed to other information hiding techniques, is that the embedder has the freedom to choose a cover image that result in the least detectable stego image. This resource has largely remained unexploited in the proposed embedding techniques. In this paper, we study the problem of cover selection by investigating three scenarios in which the embedder has either no knowledge, partial knowledge, or full knowledge of the steganalysis technique. For example, we illustrate through experiments how simple statistical measures could help embedder minimize detectability, at times by 65%, in the partial knowledge case
Article
In this paper, we propose a new method, called an adaptive skin color filter, for detecting skin color regions in a color image. The use of skin color provides an efficient way to find candidate regions for faces or hands in color images. However, it is not easy to find skin color regions because the color of skin regions varies from image to image due to a variety of reasons. Since most of the previous methods adopt a fixed threshold scheme, they are useful only in the restricted (i.e., controlled) environment. However, our method is applicable to images in more general situations since it is capable of adaptively adjusting its threshold values and effectively separating skin color regions from similar background color regions. Our method consists of basically two stages. In the first stage, a thresholding box in HSV color space is updated adaptively using a color histogram under the assumption that the area of skin color regions is comparable to that of similar background color ones. In the second stage, color vectors inside the thresholding box are classified into two groups: skin color vectors and background color vectors. Our method and other conventional methods were tested with 379 images obtained from the Internet. Experimental results show that our method is robust to the variations of skin regions’ color compared to the conventional methods.