ArticlePDF Available

Secure RGB Image Steganography Based on Triple-A Algorithm and Pixel Intensity

Authors:
  • Ranada Prasad Shaha University

Abstract and Figures

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, even perceives the existence of the hidden message. In this paper, the concept of RGB intensity properties is being merged with randomization based Triple-A algorithm to increase the hidden capacity of the data-bits. Usually, storing variable number of bits in each channel (R, G or B) of pixel depend on the actual color values of that pixel. The concept-channels containing lower color values, can store higher number of data bits. This technique can be applied to RGB images where each pixel is represented by three bytes to indicate the intensity of Red, Green, and Blue of that pixel. This work shows more effective results, especially the capacity of the data-bits to be hidden with relation to the RGB image pixels.
Content may be subject to copyright.
Intern ational Journ al of Scientific & E ngineering Research, Volume 7, Issue 3, March-2016 864
ISSN 2229-5518
IJSER © 2016
http://www.ijser.org
Secure RGB Image Steganography Based on
Triple-A Algorithm and Pixel Intensity
Md. Mizanur Rahman, Pronab Kumar Mondal, Indrani Mandal, Habiba Sultana
Abstract Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and
intended recipient, even perceives the existence of the hidden message. In this paper, the concept of RGB intensity properties is being
merged with randomization based Triple-A algorithm to increase the hidden capacity of the data-bits. Usually, storing variable number of
bits in each channel (R, G or B) of pixel depend on the actual color values of that pixel. The concept- channels containing lower color
values, can store higher number of data bits. This technique can be applied to RGB images where each pixel is represented by three bytes
to indicate the intensity of Red, Green, and Blue of that pixel. This work shows more effective results, especially the capacity of the data-
bits to be hidden with relation to the RGB image pixels.
Index TermsSteganography, RGB Bitmap image, Randomization, High Capacity Embedding, Computer Security, Histogram.
—————————— ——————————
1 INTRODUCTION
HE word Steganography originally derived from two
Greek words-Steganos which means “covered or secret”,
and Graphein which means “writing or drawing”. In this
case, Steganography literally means covered writing. Basically,
it is a secret transmission of message between two parties. It is
the practices of encoding or embedding secret information in a
manner that the existence of the information becomes invisi-
ble. This mechanism has been exercising for thousands of
years in various forms. In ancient Greece, the common practic-
es consi sted of etching messages in wooden tablets and cover-
ing them with wax, or tattooing a messenger ’s head after shav-
ing hair and then let his hair grow up before sending him to
the receiver where his hair was shaved again to extract the
massage. Other techniques use invisible ink, microdots, con-
verting channels and character arrangement [1, 2, 3, 4].
Steganography is the art and science to covert communica-
tion. It can be achieved by using carriers like image, audio and
video. In image Steganography the information is hidden ex-
clusively in an image called cover media. After inserting the
secret message it is referred to as stego-image or stego-
medium. A stego key is used for hiding or encoding process to
restrict detection or extraction of the embedded data. So image
Steganography process can be described by the under-
mentioned structure:
Cover image + Embedded message + Stego key = Stego image
The stego-image then sends to the receiver over the public
channel. The receiver can extract the message through using
the stego key which is same as used by the sender. The Fig. 1
shows basic Steganography process.
Fig. 1: Steganography process
Pixel is the smallest unit of an image. Digital images are
stored in computer systems as an array of points (pixels)
where each pixel has three color components: Red, Green, and
Blue (RGB). Each pixel is represented with three bytes to indi-
cate the intensity of these three colors (RGB).
There are many applications of image based Steganogra-
phy, such as-confidential communication and secret data stor-
ing [5, 15], access control system for digital content distribu-
tion [6], digital watermarks [7, 14], and modern printers [9].
Moreover, it can also be used to tag notes to online images and
illegitimate purposes.
This paper endeavors to improve Triple-A algorithm [12] by
adding intensity of pixel that was not considered before. The
basic concept is, the lower intensity of the pixel decides the
number of bits to embed in the cover-image. Because the lower
intensity pixel does not distort the visual quality of pixel, and
it can also store higher number of bits, which has been showed
in Fig. 3.
The rest of the paper is organized as follows: Section 2 pre-
sents some Steganography related existing methods. Section 3
describes our improved technique based on Triple-A algo-
rithm and intensity property. The experimental results and
comparison will be in section 4. Finally, conclusions are given
in section 5.
T
————————————————
Md. Mizanur Rahman is a Lecturer in Department of Computer Science
and Engineering at Ranada Prasad Shaha University, Dhaka, Bangladesh.
E-mail: mizan173@gmail.com
Pronab Kumar Mondal and Indrani Mandal are Assistant Professor,
and Habiba Sultana is Lecturer in Computer Science and Engineering
Department, Jatiya Kabi Kazi Nazrul Islam University, Dhaka, Bangla-
desh.
Transmission
Cover Image
Secret Msg
Embedding
Process
Extracting Pro-
cess
Secret Msg
Secret Key
Stego Image
IJSER
Intern ational Journ al of Scientific & E ngineering Research, Volume 7, Issue 3, March-2016 865
ISSN 2229-5518
IJSER © 2016
http://www.ijser.org
2 RELATED WORK
Several methods have been proposed for image based Ste-
ganography where the Least Significant Bit (LSB) substitution
is the simplest one [10, 13, 16]. In LSB, the least significant bit
of each pixel for a specific color channel or for all color chan-
nels is replaced with a bit from the secret data. Although LSB
is simpler than other techniques, it has long standing probabil-
ity of detecting the hidden data. But hiding information
through this algorithm has significant risk. Later Pixel Indica-
tor (PI) based stego system proposed by Adnan Gutub [1, 17]
has substantiated the overall concept. This technique uses the
least two significant bits of one of the channels from Red,
Green or Blue as an indicator for existence of data in the other
two channels. The indicator bits are set randomly in the chan-
nel. But it is hard to predict the embedding capacity through
Pixel Indicator methodology. However, another notable tech-
nique is the Stego Color Cycle (SCC) [11].This SCC technique
uses the RGB images to hide the data in different channels.
That is, it keeps cycling the hidden data between the Red,
Green and Blue channels, utilizing one channel at a cycle time.
This technique is more secure than the LSB but still it is suffers
detecting the cycling pattern that will reveal the secret data.
Also it has less capacity than the LSB. Overall Triple-A tech-
nique uses the same principle of LSB, where the secret is hid-
den in the least significant bits of the pixels, with more ran-
domization in selection of the number of bits and the color
channels that are used [12]. This randomization is expected to
increase the security and capacity of the system.
3 PROPOSED METHOD
In this section, at first we review the Triple-A technique in
[12].Triple-A algorithm taking the message (M), the carrier
image (C), and the password based generated key (K) depend-
ing on password (P), as inputs and produces the message (M)
hidden inside the carrier image (C). This algorithm can be di-
vided into two major parts, Encryption and Hiding as it is
shown in Fig. 2.
In part one the message (M) encrypted using AES algorithm
which will produce Enc (M, K). The key K can be generated
from a set of user passwords each with a specific key using
simple XOR.
In part two, the RGB Image is used as a cover media. It uti-
lizes the advantage of the Bmp images, where every pixel is
independent from the rest of the image file. Enc (M, K) is hid-
den according to Triple-A algorithm which needs to have a
pseudo random number generator (PRNG). The assumption
for PRNG is to give two new random numbers per iteration.
The seeds of these PRNGs namely Seed1 (S1) and Seed2 (S2)
are formed as a function of the Key (K). S1 is restricted to gen-
erate numbers in [0-6] while S2 is restricted to the interval [1-
3].
Fig. 2: Flow chart of Triple-A algorithm
Table 1 shows how S1 random number is used to determine
the component of the RGB image which is used in hiding the
encrypted data Enc (M, K). On the other hand, Table 2 shows
how (S2) random number determines the number of the com-
ponent(s) least significant bits that is used to hide the secret
data. On the same way (S2) random number determines the
number of component bits.
Tabl e 1: Seed1 Random Number Usage
1st PRNG
Meaning to the algorithm
use R.
1
us e G.
use B.
3
us e R G.
use RB.
5
use GB.
use RGB.
Table 2: Seed2 Random Number Usage
Hiding Encryption
No
Yes
-User enter a massage (M) to hide
-User select a carrier image (C) and password (P)
-Calculate the number of data bits in Enc (M, K)(NB)
-Calculate the maximum number of possible bits in the
carrier (C) to use in order to hide messages (MaxNB)
-Generate key (K) based on the password (P)
-Encrypt the massage (M) using the generated key (k)
to get Enc (M, K)
-
Get seed1 (S1) and seed2 (S2) as a function of the key
(K)
-
Get a pseudo random generated Number for R, G or B
selection using (S1)
-
Get a pseudo random generated Number to choose the
number of data bits to hide in the selected R, G or B
pixel using (S2)
NB<= MaxNB?
-Distribute Enc (M, K) message inside the carrier (C)
End
Start
IJSER
Intern ational Journ al of Scientific & E ngineering Research, Volume 7, Issue 3, March-2016 866
ISSN 2229-5518
IJSER © 2016
http://www.ijser.org
2nd PRNG
Random
number
Meaning to the algorithm
1
use 1 bit of the component(s).
2
use 2 bit of the component(s).
3
use 3 bit of the component(s).
Two tables show that the algorithm may add up to a maxi-
mum of ± 7 to the value of the color component(s) in that pixel.
Also, by combining data from the previous tables, we can see
that the minimum number of bits used in each pixel is 1 if we
use only one bit of one chosen components of the RGB image.
The maximum is 9 bits if we used all the three components
with three bits.
We have improved Triple-A algorithm [12] with respect to
pixel intensity, where color intensity (values of R-G-B) is used
to decide the number of bits to store in pixel. Our technique
ensures a minimum capacity and can accommodate to store
large amount of data. Our idea is that, insignificant’ colors,
significantly more bits can be changed per channel of an RGB
image, because change in lower intensity pixel value has less
visual degradation quality effects. For example according to
the Fig. 3, three pixels (R=255, G=255 and B=255) are generat-
ing White color in (a). In (b), the color component is same as
(a), except that R = 55 generate Green color. In (c), we again set
the 4 LSBs of R to zeros, resulting in a color which seems to be
same as (b).
(a)
(b) (c)
Fig. 3: Effect of colors for changes in the ‘Red’ values
Same scenario occurs for Fig. 3 where if we modify the 4
LSBs (0 to 15) of all pixels (RGB). So, if pixel intensity is less
than 16, it can be modified into 0 to 15 ranges, which will not
be degrade the visual quality of that pixel. So we can also em-
bed up to 4 bits into that pixel.
Our conception is that, in comparison with higher value of
channel the lower color value has less effect on the overall col-
or of pixel. Therefore, more bits can be changed in a channel
having ‘low’ value than a channel with a ‘high’ value. When
RGB component has to be chosen we need to select the lower
color-value channel among the three channels to store higher
number of bits. Therefore, the structure demands to insert the
following steps, and Fig. 4 shows the steps in flow chart.
Calculate the channel, whose color value is lowest
among the channels.
Decide the maximum number of data bits to store in
its least significant bits.
Store the decided number of data-bits in that channel.
Fig. 4: Flow chart of our proposed steps
Fig. 5 demonstrates one example of storing data bits in a
channel. Suppose the data channel (R) is chosen where pixel
value is 22 (00010110) and data bits to embed is 0101. After
embedding data bits pixel output value will be 27 (00011011).
Fig. 5: An example of hiding data bits inside a channe
4 RESULT ANALYSIS AND COMPARISON
This section of the paper describes the experimental results of
our proposed method, and also the comparison with the other
works. Carrier images have been used to hide text message.
Fig. 6 shows an original carrier compared to the same carrier
with secret message using our modified algorithm. From the
first moment, the visual change between the original image
and stego-image cannot be predicted; but the histogram of the
R
G
B
22
65
91
00010110
01000001
01011011
00011011
01000001
01011011
27
65
91
-Select lower value data channel among R, G and B
-Decide the maximum number of data bits to store
-Store the data-bits in that channel
IJSER
Intern ational Journ al of Scientific & E ngineering Research, Volume 7, Issue 3, March-2016 867
ISSN 2229-5518
IJSER © 2016
http://www.ijser.org
images which is shown in Fig. 7 shows a minor different in the
value of the components: R, G and B.
(a) Original carrier
(b) Carrier with secrete using modified algorithm
Fig. 6: Image Steganography testing example
Theoretically, the average number of bits are used per pixel
is equal to 3.62 where the average number for Triple-A is 3.42,
SCC is 3, and for LSB is 1. This shows us that the capacity of
the new proposed technique is higher than the previous tech-
niques. The average capacity ratio of our method is 15.08% of
the original cover media size. This is better than SCC and Tri-
ple-A algorithm where the capacity ratio is 12.50% and 14.28%
respectively. Another advantage of this technique is that the
use of minimum number of pixels to hide a message M inside
carrier C.
Tabl e 3: Comparing SCC, Triple-A and proposed technique
Size of M
(bytes) 28 KB
Average no.
of bits used
per pixel
Pixels used to
hide M inside C
Capacity
ratio
Our Proposed
3.62
6958
15.08%
SCC
3.00
27984
12.50%
Triple-A
3.43
7169
14.28%
Graph 1. Average number of bits and Capacity in KB
The main advantage of our proposed method is if we utilize
the color intensity value of cover-image to hide the data bits,
then our algorithm has very high capacity of data hiding as
compare Triple-A algorithm. In Triple-A [12] it does not utilize
the lower intensity based pixel for high capacity data embed-
ding. Table 3 and Graph-1 shows a comparison result of our
proposed algorithm with Triple-A and SCC. The table and
graph shows that the capacity ratio of our proposed method is
more than Triple-A. The result is obtained using different car-
rier images and averaging the number of pixels used in the
hiding operation. It also shows that our technique enhance the
capacity ratio without affecting the image with noise or distor-
tion.
(a) Original carrier
IJSER
Intern ational Journ al of Scientific & E ngineering Research, Volume 7, Issue 3, March-2016 868
ISSN 2229-5518
IJSER © 2016
http://www.ijser.org
(b) Carrier with secrete using SCC algorithm
(c) Carrier with secrete using Triple-A algorithm
(d) Carrier with secrete using Proposed algorithm
Fig. 7: Image Steganography histograms
5 CONCLUSION
In this paper we have explored the existing image Steganog-
raphy techniques, and have improved the data hiding capacity
of existing Triple-A algorithm [12]. Mainly the proposed algo-
rithm uses actual color of the channel in conjunction with
pseudo random number generator (PRNG) to decide the
number of data bits to store. In our technique we have utilized
the lower intensity based pixel for high data embedding. This
approach leads to very high capacity with visual quality is as
close to Triple-A algorithm.
ACKNOWLEDGMENT
The authors would like to express their sincere thanks to the
anonymous reviewers for their constructive feedback, which
helped significantly improving technical quality of this paper.
REFERENCES
[1] Adnan Gutub, Mahmo ud Ankeer, Muhammad Abu-Ghalioun, Ab-
dulrahmanShaheen, and AleemAlvi, “Pixel Indicator high capacity
Technique for RGB image Based Steganography”, WoSPA 2008
5thIEEE International Workshop on Signal Processing and its Appli-
cations, University of Sharjah, Sharjah, U.A.E. 18 20 March 2008.
[2] Adnan Gutub, LahouariGhouti, Alaaeldin Amin, TalalAlkharobi, and
Mohammad K. Ibrahim, “Utilizing Extension Character ‘Kashida’
With Pointed Letters For Arabic Text Digital Watermarking”, Interna-
tionalConference on Security and Cryptography - SECRYPT, Barce-
lona, Spain, July 28 - 31, 2007.
[3] Adnan Gutub and ManalFattani, A Novel Arabic Text Steganogra-
phy Method Using Letter Points and Extensions”, WASET Interna-
tionalConference on Computer, Information and Systems Science
andEngineering (ICCISSE), Vienna, Austria, May 25-27, 2007.
[4] Mohammad TanvirParvez and Adnan Gutub, “RGB Intensity Based
Variable-Bits Image Steganography”, APSCC 2008 Proceedings of
3rdIEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan,
9-12 December 2008.
[5] N.F. Johnson, S. Jajodia, "Exploring Steganography: Seeing the Un-
seen", IEEE computer, Vol. 31, No. 2, pages 26-34, February 1998.
[6] Fridrich, Jiri. "Applications of data hiding in digital images." Signal
Processing and Its Applications, 1999. ISSPA'99. Proceedings of the
Fifth International Symposium on. Vol. 1. IEEE, 1999.
[7] F.A.P. Petitcolas, “Intro ductio n to information hiding”, in: S. Katzen-
beisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding tech-
niques for steganography and digital watermarking, Norwood: Ar-
techHouse, INC.
[8] Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction
to steganography." Security & Privacy, IEEE 1.3 (2003): 32-44.
[9] Silman, Joshua. "Steganography and steganalysis: an overview." Sans
Institute 3 (2001): 61-76.
[10] C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substi-
tution, Pattern Recognition 37 (3) (2004) 469474.
[11] S. Venkatraman, A. Abraham, M. Paprzycki, "Significance of Ste-
ganography on Data Security", International Conference on Infor-
mation Techno logy: Coding and Computing (ITCC'04), 5-7 April
2004.
[12] Gutub, Adn an, Aye d Al-Qahtani, and AbdulazizTabakh. "Triple-A:
Secure RGB image steganography based on randomization." Com-
puter Systems and Applications, 2009.AICCSA 2009.IEEE/ACS Inter-
IJSER
Intern ational Journ al of Scientific & E ngineering Research, Volume 7, Issue 3, March-2016 869
ISSN 2229-5518
IJSER © 2016
http://www.ijser.org
national Conference on.IEEE, 2009.
[13] Kevin Curran, Karen Bailey, “An Evaluat ion of Image Based Ste-
ganography Methods”, Multimedia Tools and Applications, Vol. 30,
No. 1, Pages: 55 88, July 2006.
[14] J.-L. Dugelay and S. Roche, “A survey of current watermarking tech-
niques,” in Information Hiding Techniques for Steganography and
Digital Watermarking, S. Katzenbe isser and F. A. P. Petitcolas, Eds.
Norwood, MA: Artech House, 1999, ch. 6.
[15] Bender, Walter, et al. "Techniques for data hiding." IBM systems jour-
nal 35.3.4 (1996): 313-336.
[16] Donovan Artz, Los Alamos National Laboratory, “Digital Steganog-
raphy: Hiding Data within Data”, IEEE Internet Computing: May,
2001.
[17] Nabarun Bagchi. Article: Secure BMP Image SteganographyUsing
Dual Security Model (I.D.E.A, image intensity andBit Randomiza-
tion) and Max-Bit Algor ithm. I nternationalJournal of Computer Ap-
plications 1(21)(2010):1822.
IJSER
... MD. Mizanur Rahman et al. [22] presented solution based on pixel intensity values and the Triple-A algorithm. The proposed technique based on two parts. ...
Article
Full-text available
In the age of technology, the internet is the major component that is used to connect the whole world. The information or data that we share on the internet is not secure at all due to hackers and intruders. The prime attack on this information is a loss of confidential information or modification of this information that is called confidentiality and Integrity. Cryptography is used for secure communication over the internet in the presence of the intruder or hacker. Cryptography is a technique in which plain text converted into ciphertext in such a way that only particular receiver can understand it. In cryptography, the existence of ciphertext is known to the intruder or hacker. Whereas steganography is a technique in which message embedded into the cover image such that no one knows the existence of message except the sender and receiver. This paper provides a review of the combined effect of cryptography and steganography techniques to secure the information shared over the internet. The comparison of the combined cryptography and steganography techniques evaluated on the basis of some selected parameters like their encryption technique, key length, security, and data is hidden capacity.
... This paper displays good results, essentially in the capability of conceal the data -bits with relation to the pixels of color image. The first drawback of this technique is quality, where changing any bit may effect on the resolution of the image [Rahman, Mondal, Mandal, & Sultana, 2016). For increasing the security, combinations between two techniques are used, where the first technique is RC6 encryption and the second technique is steganography. ...
Article
Full-text available
Steganography has become an important science in security in recent years, it hides the existence of the secret information in such a way that no one suspects the information exists. In this paper a new steganography method for concealing message in message by using sailfish optimizer (SFO) and transposition method is proposed. In this work, the (SFO) is utilized to enhance the security and reduce the disfigurement to obtain best message quality, where the SFO has advantages in the term of security and text quality. The fitness values of the cover and secret message are calculated by using a new way. The SFO works to determining the matching fitness value between the cover and secret message and generates a key to recapture secret message. Lastly, relying on the matching fitness value, the steganography process is done by replacing (transposition) the secret's letters with cover's letters. The results proved that proposed method is effective, efficient and provided high security, high capacity, not malformed text and resistance against several steganalytic attacks
... This technique works well and gives effective results. Steganography becomes robust and secure when it is used with encryption (Rahman et al., 2016). When the encryption technique RC 6 is used with steganography, it gives an improvement in security. ...
... This technique works well and gives effective results. Steganography becomes robust and secure when it is used with encryption (Rahman et al., 2016). When the encryption technique RC 6 is used with steganography, it gives an improvement in security. ...
... This technique works well and gives effective results. Steganography becomes robust and secure when it is used with encryption (Rahman et al., 2016). When the encryption technique RC 6 is used with steganography, it gives an improvement in security. ...
Conference Paper
Full-text available
Image based steganography uses the images as the cover media. LSB is a commonly used technique in this filed. Several scenarios of utilizing least significant bits within images are available. We merge between the ideas from the random pixel manipulation methods and the stego-key ones to propose our work, which uses the least two significant bits of one of the channels to indicate existence of data in the other two channels. This work showed attractive results especially in the capacity of the data-bits to be hidden with relation to the RGB image pixels.
Conference Paper
Full-text available
A new image-based steganography technique-called triple-A algorithm is proposed in this paper. It uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomization in selection of the number of bits used and the color channels that are used. This randomization is expected to increase the security of the system and also increase the capacity. This technique can be applied to RGB images where each pixel is represented by three bytes to indicate the intensity of red, green, and blue in that pixel.
Conference Paper
Full-text available
In this paper, we present a new algorithm for RGB image based steganography. Our algorithm introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel based on the actual color values of that pixel: lower color component stores higher number of bits. Our algorithm offers very high capacity for cover media compared to other existing algorithms. We present experimental results showing the superiority of our algorithm. We also present comparative results with other similar algorithms in image based steganography.
Conference Paper
Full-text available
This paper exploits the existence of the redundant Arabic extension character, i.e. Kashida. We propose to use pointed letters in Arabic text with a Kashida to hold the secret bit 'one' and the un-pointed letters with a Kashida to hold 'zero'. The method can be classified under secrecy feature coding methods where it hides secret information bits within the letters benefiting from their inherited points. This watermarking technique is found attractive too to other languages having similar texts to Arabic such as Persian and Urdu.
Article
Full-text available
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Article
In this paper, a data hiding scheme by simple LSB substitution is proposed. By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stego-image can be greatly improved with low extra computational complexity. The worst case mean-square-error between the stego-image and the cover-image is derived. Experimental results show that the stego-image is visually indistinguishable from the original cover-image. The obtained results also show a significant improvement with respect to a previous work.