• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (3), 2013
  3. 373-382
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 373-382
crossmark

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
Research Article

High Capacity Triple Plane Embedding: A Colour Stego

Rengarajan Amirtharajan, G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan

ABSTRACT


In this study, we highlighted a new and efficient steganographic modus operandi based on pixel indicator routine to infix covert data in an RGB image. Usually when pixel indicator technique is employed on an RGB image, only one among the three planes (R, G and B) is labeled the indicant plane and the other two as depository planes in which the data can be stored. The proposed method is a similar concept by considering all the three planes for storage of the data instead of just two. This is carried out by using 5, 6 and 7 bits of a plane as indicator bits which increases the possible fields (from 4-8) to store the data. Because of this, the data embedding capacity of the image is improved to a greater extent since the indicator plane can also be used for embedding data in it. Optical Pixel Adjustment Process (OPAP) is also used here for reducing Mean Square Error. Furthermore the OPAP technique is not applied on the indicator plane as it modifies the indicator bits for reducing the MSE.
PDF Abstract XML References Citation
Received: April 29, 2013;   Accepted: May 23, 2013;   Published: August 06, 2013

How to cite this article

Rengarajan Amirtharajan, G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High Capacity Triple Plane Embedding: A Colour Stego. Research Journal of Information Technology, 5: 373-382.

URL: https://scialert.net/abstract/?doi=rjit.2013.373.382

Search


INTRODUCTION


Nobody really owns the internet. It is a global collection of networks for which everyone has access to. These days internet has reached even remote villages. But the million dollar question that arises is ‘How safe is this internet nowadays?’ To make internet more secure and safe, along with the growth of information technology and communication, there has been a tremendous growth in technologies to secure this information too. Information hiding is the best possible way to secure confidential information (Cheddad et al., 2010; Stefan and Fabin, 2000; Qin et al., 2010).

Many different methods are invented to encrypt and decrypt data to keep our data secret. Few among them are Cryptography (Salem et al., 2011; Schneier, 2007), Steganography (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thanikaiselvan et al., 2011; Thenmozhi et al., 2012), finger printing and water marking (Zeki et al., 2011). Cryptography is the art of scrambling of data in an unintended format so that no one other than the authorised receiver can decode it. It would look gibberish to any third person viewing it. But it has a disadvantage in that a person looking at it would find out that it is some encoded secret message (Zaidan et al., 2010). And if he gets hold of the secret code then any third person can extract it. Water marking is just for copy right protection and protection of intellectual property (Abdulfetah et al., 2010). The kind of data hidden in objects in the case of watermarking is a signature. This signature helps to signify the authority or ownership of the legal user. This study highlights about steganography and the algorithms used.

Steganography is derived from the Greek word ‘stegos’ meaning secret or something that is covered. ‘-graphy’ means art or drawing or writing, hence both put together means ‘a covered drawing’ (Al-Azawi and Fadhil, 2010; Luo et al., 2011; Mohammad et al., 2011; Zanganeh and Ibrahim, 2011; Zhao and Luo, 2012). Steganography is not new science. It has existed from the ancient times. In the olden days the secret messenger had his message encrypted in the form of tattoo and this was tattooed on his shaven head, thus, hiding the information from the third person. Only when the person’s head was shaven the image and the encrypted message could be decoded.

Ultimate aim of steganography is in the secure communication of the hidden data in a totally untraceable manner and to avoid any attention or suspicion to the transmission of the secret data. Apart from keeping others from knowing the hidden data, it should also prevent third persons from knowing that the secret data even exists. A simple classification is methods in spatial domain (Gutub, 2010; Padmaa et al., 2011) or transform domain (Amirtharajan and Rayappan, 2012d), but the cover object may be text (Xiang et al., 2011), video (Al-Frajat et al., 2010), audio (Zhu et al., 2011) or an image (Amirtharajan and Rayappan, 2012a-d; Cheddad et al., 2010). Aforementioned methods gives proper insight to steganography, in this study, a method is coined to improve the payload, imperceptibility with additional complexity in color image.

PROPOSED METHOD

The familiar method pixel indicator is proposed here by implementing new idea in that, by this way it improves embedding capacity as well as imperceptibility. It reduces the visual distortion by giving good image quality. In this method, number of bits embedded is defined by the user, say k-bit embedding. Indicator plane pixel bits tells that which plane is going to be a data plane. Two methods are introduced here; Red is taken as default indicator in method1. Method 2 uses the indicator plane cyclically. The block diagram of this study is shown in Fig. 1.

The flowcharts for embedding and extraction of the secret message are given in Fig. 2 and 3.

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 1: Block diagram for the proposed method

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 2: Flow chart for embedding the secret data

Embedding algorithm
Image for - High Capacity Triple Plane Embedding: A Colour Stego

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 3: Flow chart for extracting the secret data

Extraction algorithm
Image for - High Capacity Triple Plane Embedding: A Colour Stego

RESULTS AND DISCUSSION


Four images are taken as covers namely Lena, Baboon, Mahatma Gandhi and Temple of size 256x256x3. The algorithm is executed in MATLAB 7.1 with k = 1, 2, 3, 4 bit for each image and the results are given in Fig. 4-9. MSE and PSNR values for each iteration along with bits embedded in each pixel and total embedding capacity for method 1 and 2 is given in Table 1 and 2, respectively. The tentative results for method 1 say that it has produced substantially high PSNR values for all the images which is well above the minimum standard of 38 dB. It also conveys that the resultant stego images are of fairly high quality and cannot attract naked eyes’ attention. Of these covers, Lena holds the record of having high PSNR value of 59.0357 for k = 1 bit embedding. BPP is also passably decent. For each k bit embedding sensible amount of bits are entrenched showing that the algorithm works well with good capacity with increased complexity and security as well.

Method 2 results are given in Fig. 7-9, respectively which makes use of cyclic indicator method wherein each plane is termed indicator for subsequent iteration. Thus each plane gets a chance of being the indicator channel. Though one can witness high MSE value in all images, it produces sensibly genuine embedding capacity. Moreover, since OPAP is called the level of distortion is made under control. Stego images as well as the histograms prove this with which it can be concluded that the paper is detected to be good when equated against the subsisting ones. Unlike method 1, method 2 gives equalized grandness to every panorama of steganography.

Both the methods are probed against Chi-square run. The graphical record of Mahatma Gandhi image is shown Fig. 10. The original cover and all the four stego outputs (for k = 1, 2, 3, 4) are represented. It is evident from the graph that with the increase in number of rows the probability decreases and 2, 3, 4 bit embedding curves show almost the same results as that of the original. For 1 bit embedding the probability reduces to zero only after 100 rows in the image. Partially contrary to method 1, method 2 exhibits splendid end results. All the resultants go hand-in-hand with the cover, thus, on seeing the images one cannot even sense that they have some secret entrenched in them. After some good number of rows for all the four embedding processes the probability is zero and remains the same for the rest of the image. Thus, this routine boasts about the well built constructs and is undoubtedly full-bodied against Chi-square test.

Complexity analysis: Advanced Encryption Standard (AES) is adopted for encrypting the confidential information, it acquaints 2^128 intricacy. Of 3 planes, one act as indicator and the other two function as data channels.

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 4(a-d): Cover Images for method 1, (a) Lena, (b) Baboon, (c) Gandhi and (d) Temple

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 5(a-d): Stego Images exhibiting maximum embedding capacity, (a) Lena (b) Baboon (c) Gandhi and (d) Temple

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 6(a-e): Sample Results for a single image in method 1 (a) Cover image Mahatma Gandhi. Stego images for ‘K’ bit embedding, (b) K = 1, (c) K = 2 (d) K = 3 and (e) K = 4

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 7(a-d): Cover Images for method 2, (a) Lena, (b) Baboon, (c) Gandhi and (d) Temple

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 8(a-d): Stego images exhibiting maximum embedding capacity, (a) Lena, (b) Baboon, (c) Gandhi and (d) Temple

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 9(a-e): Sample Results for a single image in method 2 (a) Cover image Mahatma Gandhi. Stego images for ‘K’ bit embedding, (b) K = 1, (c) K = 2, (d) K = 3 and (e) K = 4

Image for - High Capacity Triple Plane Embedding: A Colour Stego
Fig. 10(a-b): Graphical results for checking (a) Method 1, (b) Method 2 against chi-square attack

This is arranged in 3x2 ways. Of the total of 8 cases, there is no embedding done for 000. This makes the total cases as 7. As a result, the total embedding complexity is given by 2^128x3x2x(8/7)x(32+(64/7)+(32/7)+(128/35)+(32/7)+(64/7)+32+256).

Table 1: MSE, PSNR, BPP and embedding capacity for method 1
Image for - High Capacity Triple Plane Embedding: A Colour Stego

Table 2: MSE, PSNR, BPP and embedding capacity for method 2
Image for - High Capacity Triple Plane Embedding: A Colour Stego

CONCLUSION


The process of embedding secret data based on indicator-plane increases the embedding entropy considerably. OPAP decreases the Mean Square Error (MSE) thus making the stego image indistinguishable with the Cover. Thus, the proposed method which is an amalgam of the above mentioned methods, it incorporates reduction of delectability and increase of entropy at the same time. Imperceptibility, capacity is the major expectation in image steganography both is excellent in this study.

REFERENCES


  1. Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad, 2010. Robust adaptive image watermarking using visual models in DWT and DCT domain. Inform. Technol. J., 9: 460-466.
    CrossRefDirect Link

  2. Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    CrossRefDirect Link

  3. Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRefDirect Link

  4. Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRefDirect Link

  5. Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRefDirect Link

  6. Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRefDirect Link

  7. Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRefDirect Link

  8. Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRefDirect Link

  9. Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRefDirect Link

  10. Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRefDirect Link

  11. Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
    CrossRefDirect Link

  12. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRefDirect Link

  13. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRefDirect Link

  14. Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    CrossRefDirect Link

  15. Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
    CrossRefDirect Link

  16. Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRefDirect Link

  17. Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
    CrossRefDirect Link

  18. Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRefDirect Link

  19. Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRefDirect Link

  20. Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784.

  21. Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK.

  22. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link

  23. Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRefDirect Link

  24. Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
    CrossRefDirect Link

  25. Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRefDirect Link

  26. Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
    CrossRefDirect Link

  27. Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
    CrossRef

  28. Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
    CrossRefDirect Link

  29. Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
    CrossRefDirect Link

Search


Related Articles

Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved