Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

Document Type : Research Article

Authors

Department of Electrical Engineering, Sahand University of Technology, Tabriz, Iran

Abstract

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed secret information into more significant bits of the image, it has improved embedding payload. The steps of extracting data from the host image are independent of the original image. Therefore, the proposed algorithm has a blind detection process which is more suitable for practical and online applications. The simulation results show that the proposed algorithm is also able to retrieve destroyed data by intentional or unintentional attacks such as addition of noise and filtering due to use of the error correction code. In addition, the payload is improved in comparison with the same techniques.

Keywords

Main Subjects


[1] W. Zeng, Digital watermarking and data hiding: technologies and applications, in: Proc. Int. Conf. Inf. Syst. Anal. Synth, 1998, pp. 223-229.
[2] M. Wu, B. Liu, Data hiding in image and video. I. Fundamental issues and solutions, Image Processing, IEEE Transactions on, 12(6) (2003) 685-695.
[3] M. Wu, H. Yu, B. Liu, Data hiding in image and video. II. Designs and applications, Image Processing, IEEE Transactions on, 12(6) (2003) 696-705.
[4] C.-T. Wang, H.-F. Yu, A Markov-based reversible data hiding method based on histogram shifting, Journal of Visual Communication and Image Representation, 23(5) (2012) 798-811.
[5] X. Zhang, S. Wang, Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, 25(3) (2004) 331-339.
[6] H.V. Desai, Steganography, Cryptography, Watermarking: A Comparitive Study, Journal of Global Research in Computer Science, 3(12) (2013) 33-35.
[7] J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and. watermarking algorithms, Multimedia, IEEE, 8(4) (2001) 54-65.
[8] A. Abbass, E. Soleit, S. Ghoniemy, Blind video data hiding using integer wavelet transforms, Ubiquitous Computing and Communication Journal, (2007).
[9] Y. Wang, A. Pearmain, Blind image data hiding based on self reference, Pattern Recognition Letters, 25(15) (2004) 1681-1689.
[10] X.-Y. Luo, D.-S. Wang, P. Wang, F.-L. Liu, A review on blind detection for image steganography, Signal Processing, 88(9) (2008) 2138-2157.
[11] H. Yang, X. Sun, G. Sun, A high-capacity image data hiding scheme using adaptive LSB substitution, Radioengineering, 18(4) (2009) 509.
[12] R.-Z. Wang, C.-F. Lin, J.-C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern recognition, 34(3) (2001) 671-683.
[13] C.-C. Thien, J.-C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition, 36(12) (2003) 2875-2881.
[14] C.-C. Chang, C.-S. Chan, Y.-H. Fan, Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels, Pattern Recognition, 39(6) (2006) 1155-1167.
[15] A.D. Ker, Steganalysis of LSB matching in grayscale images, Signal Processing Letters, IEEE, 12(6) (2005) 441-444.
[16] J. Mielikainen, LSB matching revisited, Signal Processing Letters, IEEE, 13(5) (2006) 285-287.
[17] D.-C. Wu, W.-H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, 24(9) (2003) 1613-1626.
[18] H. Yang, X. Sun, G. Sun, A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution, Radioengineering, 18(4) (2009).
[19] Y. Zhang, J. Jiang, Y. Zha, H. Zhang, S. Zhao, Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images, International Journal of Intelligence Science, 3 (2013) 77.
[20] B. Jena, High payload digital image steganography using mixed edge detection mechanism, 2014.
[21] Z.-X. Yin, C.-C. Chang, Q. Xu, B. Luo, Second-order steganographic method based on adaptive reference matrix, IET Image Processing, 9(4) (2015) 300-305.
[22] X. Zhang, S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE Communications Letters, 10(11) (2006) 781-783.
[23] C.-C. Chang, Y.-C. Chou, T.D. Kieu, An information hiding scheme using Sudoku, in: Innovative Computing Information and Control, 2008. ICICIC’08. 3rd International Conference on, IEEE, 2008, pp. 17-17.
[24] W. Hong, T.-S. Chen, C.-W. Shiu, A minimal Euclidean distance searching technique for Sudoku steganography, in: 2008 International Symposium on Information Science and Engineering, IEEE, 2008, pp. 515-518.
[25] R.-M. Chao, H.-C. Wu, C.-C. Lee, Y.-P. Chu, A novel image data hiding scheme with diamond encoding, EURASIP Journal on Information Security, 2009(1) (2009) 1.
[26] Z. Yin, B. Luo, MDE.based image steganography with large embedding capacity, Security and Communication Networks, (2015).
[27] R. Crandall, Some notes on steganography, Posted on steganography mailing list, (1998).
[28] A. Westfeld, F5—a steganographic algorithm, in: Information hiding, Springer, 2001, pp. 289-302.
[29] W. Zhang, S. Wang, X. Zhang, Improving embedding efficiency of covering codes for applications in steganography, Communications Letters, IEEE, 11(8) (2007) 680-682.
[30] C.-C. Chang, T.D. Kieu, Y.-C. Chou, A high payload steganographic scheme based on (7, 4) hamming code for digital images, in: Electronic Commerce and Security, 2008 International Symposium on, IEEE, 2008, pp. 16- 21.
[31] S. Singh, T.J. Siddiqui, A Security Enhanced Robust Steganography Algorithm for Data Hiding, International Journal of Computer Science Issues (IJCSI), 9(3) (2012).
[32] S.B. Wicker, Error control systems for digital communication and storage, Prentice hall Englewood Cliffs, 1995.
[33] L. Shu, S. Lin, D.J. Costello, Error control coding, Pearson Education India, 2004.