ABSTRACT
This study proposes an innovative methodology that incorporates the famous Rubiks cube into steganography. Rubiks cube is a pivot mechanism that enables each face to turn independently thus allowing mixing up of colors. By using this mechanism to represent the three planes of a color image (Red, Green, and Blue) the randomness of the stego image can be improved. The pixel intensity values can additionally be used as pointers to indicate the type of shift that needs to be done to the pixels in three planes. This study contains the experimental results that validate the superiority of this methodology compared to other existing ones in terms of imperceptibility, robustness and with reasonable embedding capacity. It is also found to be more resistant to steganalysis.
PDF Abstract XML References Citation
How to cite this article
URL: https://scialert.net/abstract/?doi=rjit.2013.329.340
INTRODUCTION
Human way of communication has come a long way from cave drawings and drums to electronic mails. As more and more information is communicated electronically, new needs, issues and opportunities are born. Authenticity and secret sharing are becoming the prime concerns (Abdulfetah et al., 2010; Zaidan et al., 2011). Data encryption (Salem et al., 2011; Schneier, 2007) and data hiding (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thanikaiselvan et al., 2011) are so increasingly being used to protect the sensitive data from disclosure when they are transmitted over an insecure channel.
Imperceptibility and high embedding capacity coupled with robustness are the three main criteria that decide the performance of any stego algorithm (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012). Imperceptibility and embedding capacity are the two main concerns of steganography while robustness is the prime concern of water marking (Amirtharajan et al., 2012; Abdulfetah et al., 2010; Stefan and Fabin, 2000; Zeki et al., 2011).
Data can be hidden in a grayscale (Amirtharajan and Rayappan, 2012a) or color (Gutub, 2010; Padmaa et al., 2011) image because slight changes to colors of pixels are imperceptible to the eye (Amirtharajan and Rayappan, 2012a-d). The principle of LSB substitution can be used to induce these changes, that is to embed data into the cover image. The modified image is known as stego image (Chan and Cheng, 2004). Given a color image each pixel is represented by three bytes. Each byte represents a color component, typically red, green, and blue (Padmaa et al., 2011). Furtive information, in bits, is veiled by laying it as LSBs in pixel bytes. The least significant bit is either a 0 or 1. The former is also the same. Hence, typically no more than half LSBs get altered through bits shrouding.
An improvement to basic LSB substitution is to hide a bit in a pixel only if the pixel satisfies certain conditions (Zanganeh and Ibrahim, 2011) or after randomization of the pixel (Zhao and Luo, 2012). Hmood et al. (2010a, b) described the capacity of information hiding and an overview about steganography. Luo et al. (2011) explains secret sharing and data hiding for clandestine information adopting block truncation coding in compressed images. Several methods are available in the literature for different cover objects (Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thenmozhi et al., 2012) like text (Al-Azawi and Fadhil, 2010; Xiang et al., 2011), image (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Luo et al., 2011; Mohammad et al., 2011), audio (Zhu et al., 2011) and video (Al-Frajat et al., 2010). Nevertheless a method is seldom considered for data hiding in scrambled images.
This study advises an unequalled model for image steganography in which Rubiks cube theory is practised to scramble an image and then secret data entrenching is entitled using cyclic pixel indicator and LSB substitution.
PROPOSED METHOD
In this proposed methodology the pixels are first scrambled and then data is embedded based on their intensity values. For scrambling, the famous Rubiks cube methodology is implemented (Yen and Lin, 2010). The three rows of a face of the Rubiks cube are taken as the three components of the color pixel (Loukhaoukha et al., 2012). For instance, the first row is taken as red, the second row green and third blue. Based on the third and fourth bits of the bytes of a particular component, the other two components are scrambled by rotation. Then by using the first and second bits of a channel as pointer, embedding is carried out in the other two channels. This accounts for improved randomness that can resist any steganalysis (Qin et al., 2010). Embedding capacity is also enhanced as all the three channels are effectively used in hiding data.
A comparison of the original image and the stego image would show an attacker which bits have been modified and may serve as the basis of a successful attack on the hidden data. That is why the original image should be destroyed right after the stego image has been prepared.
This study wishes for a methodology of k = 2 bit embedding derived from the expertise of Rubiks cube. The algorithm comprises of both image scrambling and embedding to pull off the aspiration of secret sharing. Scrambling procedure is defined which involves shifting of bits. The diagram of Rubiks cube and its rotated and scrambled image is shown in Fig. 1.
Pixel indicator technique is used in this paper where indicator channel is cyclically chosen. The proposed block diagram is given in Fig. 2. Here, the secret data is embedded in to cover image which is scrambled using Rubiks cube. The embedded image is descrambled as original image to get stego image. Then the stego image is scrambled using Rubiks cube and then extracted to get the original data.
![]() | |
Fig. 1(a-c): | (a) Rubiks cube (b) Rotated Rubiks cube and (c) Scrambled Rubiks cube |
![]() | |
Fig. 2: | Block diagram for proposed method |
Algorithm for embedding: |
![]() |
Algorithm for extraction: |
![]() |
![]() | |
Fig. 3: | Move the first bit into the Temp |
![]() | |
Fig. 4: | Return the Temp value to Array |
![]() | |
Fig. 5: | Flow chart for embedding |
The flow chart for embedding and extraction are given in Fig. 5 and 6, respectively. Here embedding and extraction process are explained in step by step manner.
RESULTS AND DISCUSSION
To justify the effectiveness of this study, the algorithm is simulated in MATLAB 7.1 with Lena, Baboon, Mahatma Gandhi and Temple as carrier images are depicted in Fig. 7a-10a with their corresponding stego images and accordingly their histograms are shown in 7b-10b. All images are of dimension 256x256x3 and approximately 30-35 kb in size.
![]() | |
Fig. 6: | Flow chart for extraction |
Here, pixel indicator technique is exploited to appreciate the goodness of the algorithm with the liberality in choosing the indicator for each embedding.
Tabulation for comparative results of MSE, PSNR, BPP and total number of bits embedded are tabulated in Table 1.
Thus, by fixing indicator channel, and based on that 2 bits are embedded in every iteration in each plane. As per the size and dimension of the images, MSE and PSNR values are vary in each plane.
Table 1: | Comparative results of MSE, PSNR, BPP and total number of bits embedded |
![]() | |
If we take Lena image, Green plane has the highest PSNR of 53.9904 and minimum of 49.6593 in Blue plane. If all four images are likened, Temple plane offers relatively high PSNR in all of its 3 planes. Approximately, BPP witnessed in these images is found to be 0.6660 which is fairly straight for constant bit embedding. More or less 130677 bits are embedded in each plane which says about the efficiency of the algorithm.
In order to make the readers understand this libretto apart from analytical results, histograms and stego images are also portrayed. One can notice that covers and their corresponding stegos remain identical without giving a clue about secret sharing. As a result, they possess far above the ground imperceptibility which is what needed the most in a steganographic run. Moreover, encryption algorithm is designed by taking Rubiks cube fundamentals. This would create more complexity along with security as well.
This study is justified in terms of steganalysis also to prove the performance. One such attack is Chi-square which generally tests the competence of any algorithm by giving pictorial representation. Here, for performance analysis sake, Mahatma Gandhi image is exposed to the test and graphical results are obtained in Fig. 11.
The two curves represent cover and stego images. Before 50 rows the probability of embedding gradually minimizes to zero that clears the fact that the stego seems as if it contains no secret hidden in it. However, more care is taken in bringing up the obscurity, which is revealed in the graph given. In general, probability of 1 is when all rows undergo embedding and 0 if none.
![]() | |
Fig. 7(a-b): | (a) Lena cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images |
![]() | |
Fig. 8(a-b): | (a) Baboon cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images |
![]() | |
Fig. 9(a-b): | (a) Mahatma Gandhi cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images |
![]() | |
Fig. 10(a-b): | (a) Temple cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images |
![]() | |
Fig. 11: | Graphical results for Mahatma Gandhi against chi square test |
CONCLUSION
Rubiks cube is a 3-D mishmash riddle, which has lent itself in discovering numerous theories and concepts in mathematics and engineering. This paper takes the idea of Rubiks cube and formulates it in an image steganographic scheme. Secret data undergoes manipulation on some grounds of cryptography and further follows steganographic principles to share the secret. The experimental values show that this is one benevolent model for hiding secret in images. It also has the possibility of practical realization apart from owning secrecy and anonymity. The study is also tested against Chi-square to give good reason for. Thus, this study proposes a beneficial steganographic method when equated with previously available ones.
REFERENCES
- Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad, 2010. Robust adaptive image watermarking using visual models in DWT and DCT domain. Inform. Technol. J., 9: 460-466.
CrossRefDirect Link - Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
CrossRefDirect Link - Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
CrossRefDirect Link - Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37.
CrossRefDirect Link - Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.
CrossRef - Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
CrossRefDirect Link - Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
CrossRefDirect Link - Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
CrossRefDirect Link - Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
CrossRefDirect Link - Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
CrossRefDirect Link - Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
CrossRefDirect Link - Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
CrossRefDirect Link - Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRefDirect Link - Yen, E. and L.H. Lin, 2010. Rubik's cube watermark technology for grayscale images. Expert Syst. Appl., 37: 4033-4039.
CrossRef - Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
CrossRefDirect Link - Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
CrossRefDirect Link - Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
CrossRefDirect Link - Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
CrossRefDirect Link - Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
CrossRefDirect Link - Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
CrossRefDirect Link - Loukhaoukha, K., J.Y. Chouinard and A. Berdai, 2012. A secure image encryption algorithm based on Rubik's cube principle. J. Electr. Comput. Eng.
CrossRefDirect Link - Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
CrossRefDirect Link - Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
CrossRefDirect Link - Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
CrossRefDirect Link - Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
CrossRefDirect Link - Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
CrossRefDirect Link - Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
Direct Link - Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
CrossRefDirect Link - Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
CrossRefDirect Link - Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
CrossRefDirect Link - Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
CrossRefDirect Link - Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
CrossRef - Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
CrossRefDirect Link - Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
CrossRefDirect Link