Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (BEASS)

Published: 01 January 2021 Publication History

Abstract

The advantage of spatial domain image steganography techniques is their capacity to embed high payloads of data by directly modifying image pixels. While these techniques have a high-embedding capacity, they often create visual and statistical distortion in smoother regions. Most existing edge steganography techniques divide an image into blocks and insert data by processing the blocks in a linear order, but these method also has multiple drawbacks. First, if the selected block has an insufficient number of edge pixels, it may result in multiple blocks being processed. Second, at high embedding rates, the method creates severe distortion as multiple message bits are hidden in edge pixels and surrounding non-edge pixels without analyzing the statistical dependencies and correlation of pixels, compromising data security. The aim of the proposed method is to construct a Block-wise Edge Adaptive Steganography Scheme (BEASS) using textured regions, particularly edges and surrounding pixels. This scheme dynamically chooses the region to embed messages using a local complexity measure of Standard Deviation. It offers high payload, minimal distortion embedding by hiding three message bits into edge pixels using the minimal Mean Square Error to determine the embedding capacity of neighboring non-edge pixels within the block to preserve the statistical dependencies. The practical merit of this approach was validated and compared with existing algorithms, and experimental results find that the proposed method surpasses IQM tests, achieves a high PSNR of6165, proves to be robust against kurtosis and skewness distortion, resists histogram attack, RS steganalysis and high dimensional ensemble classifier at 80% block modifications.

References

[1]
Cheddad A, Condell J, Curran K, and Mc Kevitt P Digital image steganography: Survey and analysis of current methods Signal Process 2010 90 727-752
[2]
Bai J, Chang C-C, Nguyen S, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays, pp 46
[3]
Bassil Y Image Steganography based on a Parameterized Canny Edge Detection Algorithm Int J Comput Appl 2012 60 4 55-40
[4]
Li B, He J, Huang J, and Shi YQ A survey on image steganography and steganalysis Journal of Information Hiding and Multimedia Signal Processing 2011 2 2 142-172
[5]
Chakraborty S, Jalal A, and Bhatnagar C LSB Based non blind predictive edge adaptive image steganography Multimedia Tools and Applications 2017 76 7973-7987
[6]
Chan C-K and Cheng LM Hiding data in images by simple LSB substitution Pattern Recogn 2004 37 469-474
[7]
Chandramouli R and Memon N Analysis of LSB based image steganography techniques IEEE 2001 3 1019-1022
[8]
Fawcett T ROC Graphs: notes and practical considerations for researchers Mach Learn 2004 31 1-38
[9]
Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. Proceedings of SPIE-The International Society for Optical Engineering, pp 7532
[10]
Fridrich J, Goljan M (2002) Practical steganalysis of digital Images-State of the art. Proceedings of SPIE-The International Society for Optical Engineering: pp 1–13
[11]
Al-Dmour H, Al-Ani A (2015) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl, 46(C)
[12]
Hempstalk K (2006) Hiding Behind Corners: Using Edges in Images for Better Steganography
[13]
Leng H-S and Tseng H-W High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion IET Image Process 2014 8 647-654
[14]
Islam S, Modi M, Gupta P (2014) Edge-based image steganography. EURASIP Journal on Information Security, pp 8
[15]
Kodovsky J, Fridrich J (2011) Steganalysis in high dimensions: Fusing classifiers built on random subspaces. Proceedings of SPIE-The International Society for Optical Engineering, pp 7880
[16]
Jung K-H Comparative Histogram Analysis of LSB-based Image Steganography WSEAS Transactions on Systems and Control 2018 13 103-112
[17]
Ker A Steganalysis of LSB matching in grayscale images Signal Processing Letters IEEE 2005 12 441-444
[18]
Kodovsky J, Fridrich J, and Holub V Ensemble classifiers for steganalysis of digital media IEEE Transactions on Information Forensics and Security 2012 7 2 432-444
[19]
Koo H and Cho N Skew estimation of natural images based on a salient line detector J Electron Imaging 2013 22 1 013020(1)-013020(6)
[20]
Sanjeev K, Amarpal S, and Manoh K Information hiding with adaptive steganography based on Novel Fuzzy edge identification Elsevier Defense Technology 2019 15 162-169
[21]
Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. SSRN Electronic Journal, 10.2139/ssrn.3171494
[22]
Lee YK and Chen L-H High capacity image steganography model Vision Image and Signal Processing IEE Proceedings 2000 147 288-294
[23]
Liao X, Yu Y, Li B, Li Z, and Qin Z A new payload partition strategy in color image steganography IEEE Transactions on Circuits and Systems for Video Technology 2020 30 3 685-696
[24]
Luo W, Huang F, and Huang J Edge adaptive image steganography based on LSB matching revisited IEEE Transactions on Information Forensics and Security 2010 5 201-214
[25]
Mielikainen J LSB Matching revisited Signal Processing Letters IEEE 2006 13 285-287
[26]
Pevný T, Bas P, and Fridrich J Steganalysis by subtractive pixel adjacency matrix IEEE Transactions on Information Forensics and Security 2010 5 2 142-172
[27]
Subhedar M, Mankar V (2014) Current status and key issues in image steganography: a survey. Computer Science Review, pp 95–113
[28]
Cheng W-J, Chang C-C, and Le T High payload steganography mechanism using hybrid edge detector Expert Syst Appl 2010 37 3292-3301
[29]
Yang C-H, Weng C-Y, Wang S-J, and Sun H-M Adaptive data hiding in edge areas of images with spatial LSB domain systems Information Forensics and Security IEEE Transactions 2008 3 2 488-497
[30]
Liu Y, Cheng MM, Bian J, Zhang LJ, Peng T, Cao Y (2018) Semantic edge detection with diverse deep supervision. ArXiv Computer Science, arXiv:1804.02864

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2023)Digital Media Steganography Based on Spatial Distortion Model Is Used to Encrypt Consumer Electronic Product DataIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333620170:1(4490-4498)Online publication date: 28-Nov-2023
  • (2023)Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domainApplied Soft Computing10.1016/j.asoc.2022.109847132:COnline publication date: 1-Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 80, Issue 1
Jan 2021
1589 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 January 2021
Accepted: 31 July 2020
Revision received: 23 July 2020
Received: 11 January 2020

Author Tags

  1. Adaptive image steganography
  2. Image Quality Metrics (IQM)
  3. Least Significant Bit (LSB)
  4. Local complexity analysis
  5. Statistical distortion
  6. Mean Square Error (MSE)
  7. Steganalysis

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2023)Digital Media Steganography Based on Spatial Distortion Model Is Used to Encrypt Consumer Electronic Product DataIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333620170:1(4490-4498)Online publication date: 28-Nov-2023
  • (2023)Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domainApplied Soft Computing10.1016/j.asoc.2022.109847132:COnline publication date: 1-Jan-2023
  • (2023)A new data hiding model based on adaptive keyed Huffman multi-layer midpoint folding and optimized deep wavelet histogram modification strategyMultimedia Tools and Applications10.1007/s11042-023-15390-182:30(47189-47214)Online publication date: 1-Dec-2023
  • (2022)Low distortion and adaptive image steganography by enhancing DBSCAN, Sobel operator, and XOR codingJournal of Information Security and Applications10.1016/j.jisa.2022.10334370:COnline publication date: 1-Nov-2022
  • (2022)An adaptive image steganography method based on integer wavelet transform using genetic algorithmComputers and Electrical Engineering10.1016/j.compeleceng.2022.10780999:COnline publication date: 1-Apr-2022
  • (2022)A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-boxMultimedia Tools and Applications10.1007/s11042-022-12828-w81:27(39753-39784)Online publication date: 1-Nov-2022
  • (2022)High payload image steganography scheme with minimum distortion based on distinction grade value methodMultimedia Tools and Applications10.1007/s11042-022-12691-981:18(25913-25946)Online publication date: 1-Jul-2022
  • (2022)A secure image steganography based on modified matrix encoding using the adaptive region selection techniqueMultimedia Tools and Applications10.1007/s11042-022-12677-781:18(25251-25281)Online publication date: 1-Jul-2022
  • (2022)A new reversible low-distortion steganography method that hides images into RGB images with low lossMultimedia Tools and Applications10.1007/s11042-021-11405-x81:1(953-973)Online publication date: 1-Jan-2022
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media