• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (3), 2013
  3. 329-340
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 329-340
crossmark

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
Research Article

Rubik’s Cube: A Way for Random Image Steganography

Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan

ABSTRACT


This study proposes an innovative methodology that incorporates the famous Rubik’s cube into steganography. Rubik’s cube is a pivot mechanism that enables each face to turn independently thus allowing mixing up of colors. By using this mechanism to represent the three planes of a color image (Red, Green, and Blue) the randomness of the stego image can be improved. The pixel intensity values can additionally be used as pointers to indicate the type of shift that needs to be done to the pixels in three planes. This study contains the experimental results that validate the superiority of this methodology compared to other existing ones in terms of imperceptibility, robustness and with reasonable embedding capacity. It is also found to be more resistant to steganalysis.
PDF Abstract XML References Citation
Received: April 29, 2013;   Accepted: May 16, 2013;   Published: August 06, 2013

How to cite this article

Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik’s Cube: A Way for Random Image Steganography. Research Journal of Information Technology, 5: 329-340.

URL: https://scialert.net/abstract/?doi=rjit.2013.329.340

Search


INTRODUCTION


Human way of communication has come a long way from cave drawings and drums to electronic mails. As more and more information is communicated electronically, new needs, issues and opportunities are born. Authenticity and secret sharing are becoming the prime concerns (Abdulfetah et al., 2010; Zaidan et al., 2011). Data encryption (Salem et al., 2011; Schneier, 2007) and data hiding (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thanikaiselvan et al., 2011) are so increasingly being used to protect the sensitive data from disclosure when they are transmitted over an insecure channel.

Imperceptibility and high embedding capacity coupled with robustness are the three main criteria that decide the performance of any stego algorithm (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012). Imperceptibility and embedding capacity are the two main concerns of steganography while robustness is the prime concern of water marking (Amirtharajan et al., 2012; Abdulfetah et al., 2010; Stefan and Fabin, 2000; Zeki et al., 2011).

Data can be hidden in a grayscale (Amirtharajan and Rayappan, 2012a) or color (Gutub, 2010; Padmaa et al., 2011) image because slight changes to colors of pixels are imperceptible to the eye (Amirtharajan and Rayappan, 2012a-d). The principle of LSB substitution can be used to induce these changes, that is to embed data into the cover image. The modified image is known as stego image (Chan and Cheng, 2004). Given a color image each pixel is represented by three bytes. Each byte represents a color component, typically red, green, and blue (Padmaa et al., 2011). Furtive information, in bits, is veiled by laying it as LSBs in pixel bytes. The least significant bit is either a 0 or 1. The former is also the same. Hence, typically no more than half LSBs get altered through bits shrouding.

An improvement to basic LSB substitution is to hide a bit in a pixel only if the pixel satisfies certain conditions (Zanganeh and Ibrahim, 2011) or after randomization of the pixel (Zhao and Luo, 2012). Hmood et al. (2010a, b) described the capacity of information hiding and an overview about steganography. Luo et al. (2011) explains secret sharing and data hiding for clandestine information adopting block truncation coding in compressed images. Several methods are available in the literature for different cover objects (Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thenmozhi et al., 2012) like text (Al-Azawi and Fadhil, 2010; Xiang et al., 2011), image (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Luo et al., 2011; Mohammad et al., 2011), audio (Zhu et al., 2011) and video (Al-Frajat et al., 2010). Nevertheless a method is seldom considered for data hiding in scrambled images.

This study advises an unequalled model for image steganography in which Rubik’s cube theory is practised to scramble an image and then secret data entrenching is entitled using cyclic pixel indicator and LSB substitution.

PROPOSED METHOD

In this proposed methodology the pixels are first scrambled and then data is embedded based on their intensity values. For scrambling, the famous Rubik’s cube methodology is implemented (Yen and Lin, 2010). The three rows of a face of the Rubik’s cube are taken as the three components of the color pixel (Loukhaoukha et al., 2012). For instance, the first row is taken as red, the second row green and third blue. Based on the third and fourth bits of the bytes of a particular component, the other two components are scrambled by rotation. Then by using the first and second bits of a channel as pointer, embedding is carried out in the other two channels. This accounts for improved randomness that can resist any steganalysis (Qin et al., 2010). Embedding capacity is also enhanced as all the three channels are effectively used in hiding data.

A comparison of the original image and the stego image would show an attacker which bits have been modified and may serve as the basis of a successful attack on the hidden data. That is why the original image should be destroyed right after the stego image has been prepared.

This study wishes for a methodology of k = 2 bit embedding derived from the expertise of Rubik’s cube. The algorithm comprises of both image scrambling and embedding to pull off the aspiration of secret sharing. Scrambling procedure is defined which involves shifting of bits. The diagram of Rubik’s cube and its rotated and scrambled image is shown in Fig. 1.

Pixel indicator technique is used in this paper where indicator channel is cyclically chosen. The proposed block diagram is given in Fig. 2. Here, the secret data is embedded in to cover image which is scrambled using Rubik’s cube. The embedded image is descrambled as original image to get stego image. Then the stego image is scrambled using Rubik’s cube and then extracted to get the original data.

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 1(a-c): (a) Rubik’s cube (b) Rotated Rubik’s cube and (c) Scrambled Rubik’s cube

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 2: Block diagram for proposed method

Algorithm for embedding:
Image for - Rubik’s Cube: A Way for Random Image Steganography

Algorithm for extraction:
Image for - Rubik’s Cube: A Way for Random Image Steganography


Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 3: Move the first bit into the Temp

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 4: Return the Temp value to Array

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 5: Flow chart for embedding

The flow chart for embedding and extraction are given in Fig. 5 and 6, respectively. Here embedding and extraction process are explained in step by step manner.

RESULTS AND DISCUSSION


To justify the effectiveness of this study, the algorithm is simulated in MATLAB 7.1 with Lena, Baboon, Mahatma Gandhi and Temple as carrier images are depicted in Fig. 7a-10a with their corresponding stego images and accordingly their histograms are shown in 7b-10b. All images are of dimension 256x256x3 and approximately 30-35 kb in size.

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 6: Flow chart for extraction

Here, pixel indicator technique is exploited to appreciate the goodness of the algorithm with the liberality in choosing the indicator for each embedding.

Tabulation for comparative results of MSE, PSNR, BPP and total number of bits embedded are tabulated in Table 1.

Thus, by fixing indicator channel, and based on that 2 bits are embedded in every iteration in each plane. As per the size and dimension of the images, MSE and PSNR values are vary in each plane.

Table 1: Comparative results of MSE, PSNR, BPP and total number of bits embedded
Image for - Rubik’s Cube: A Way for Random Image Steganography

If we take Lena image, Green plane has the highest PSNR of 53.9904 and minimum of 49.6593 in Blue plane. If all four images are likened, Temple plane offers relatively high PSNR in all of its 3 planes. Approximately, BPP witnessed in these images is found to be 0.6660 which is fairly straight for constant bit embedding. More or less 130677 bits are embedded in each plane which says about the efficiency of the algorithm.

In order to make the readers understand this libretto apart from analytical results, histograms and stego images are also portrayed. One can notice that covers and their corresponding stegos remain identical without giving a clue about secret sharing. As a result, they possess far above the ground imperceptibility which is what needed the most in a steganographic run. Moreover, encryption algorithm is designed by taking Rubik’s cube fundamentals. This would create more complexity along with security as well.

This study is justified in terms of steganalysis also to prove the performance. One such attack is Chi-square which generally tests the competence of any algorithm by giving pictorial representation. Here, for performance analysis sake, Mahatma Gandhi image is exposed to the test and graphical results are obtained in Fig. 11.

The two curves represent cover and stego images. Before 50 rows the probability of embedding gradually minimizes to zero that clears the fact that the stego seems as if it contains no secret hidden in it. However, more care is taken in bringing up the obscurity, which is revealed in the graph given. In general, probability of 1 is when all rows undergo embedding and 0 if none.

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 7(a-b): (a) Lena cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 8(a-b): (a) Baboon cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 9(a-b): (a) Mahatma Gandhi cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 10(a-b): (a) Temple cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Image for - Rubik’s Cube: A Way for Random Image Steganography
Fig. 11: Graphical results for Mahatma Gandhi against chi square test

CONCLUSION


Rubik’s cube is a 3-D mishmash riddle, which has lent itself in discovering numerous theories and concepts in mathematics and engineering. This paper takes the idea of Rubik’s cube and formulates it in an image steganographic scheme. Secret data undergoes manipulation on some grounds of cryptography and further follows steganographic principles to share the secret. The experimental values show that this is one benevolent model for hiding secret in images. It also has the possibility of practical realization apart from owning secrecy and anonymity. The study is also tested against Chi-square to give good reason for. Thus, this study proposes a beneficial steganographic method when equated with previously available ones.

REFERENCES


  1. Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad, 2010. Robust adaptive image watermarking using visual models in DWT and DCT domain. Inform. Technol. J., 9: 460-466.
    CrossRefDirect Link

  2. Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    CrossRefDirect Link

  3. Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRefDirect Link

  4. Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37.
    CrossRefDirect Link

  5. Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.
    CrossRef

  6. Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRefDirect Link

  7. Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRefDirect Link

  8. Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRefDirect Link

  9. Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRefDirect Link

  10. Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRefDirect Link

  11. Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRefDirect Link

  12. Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
    CrossRefDirect Link

  13. Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRefDirect Link

  14. Yen, E. and L.H. Lin, 2010. Rubik's cube watermark technology for grayscale images. Expert Syst. Appl., 37: 4033-4039.
    CrossRef

  15. Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
    CrossRefDirect Link

  16. Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    CrossRefDirect Link

  17. Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    CrossRefDirect Link

  18. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRefDirect Link

  19. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRefDirect Link

  20. Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    CrossRefDirect Link

  21. Loukhaoukha, K., J.Y. Chouinard and A. Berdai, 2012. A secure image encryption algorithm based on Rubik's cube principle. J. Electr. Comput. Eng.
    CrossRefDirect Link

  22. Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
    CrossRefDirect Link

  23. Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRefDirect Link

  24. Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
    CrossRefDirect Link

  25. Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRefDirect Link

  26. Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRefDirect Link

  27. Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784.

  28. Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK.

  29. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link

  30. Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRefDirect Link

  31. Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
    CrossRefDirect Link

  32. Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRefDirect Link

  33. Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
    CrossRefDirect Link

  34. Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
    CrossRef

  35. Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
    CrossRefDirect Link

  36. Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
    CrossRefDirect Link

Search


Related Articles

Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved