HOME JOURNALS CONTACT

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 329-340
DOI: 10.17311/rjit.2013.329.340
Rubik’s Cube: A Way for Random Image Steganography
Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan

Abstract: This study proposes an innovative methodology that incorporates the famous Rubik’s cube into steganography. Rubik’s cube is a pivot mechanism that enables each face to turn independently thus allowing mixing up of colors. By using this mechanism to represent the three planes of a color image (Red, Green, and Blue) the randomness of the stego image can be improved. The pixel intensity values can additionally be used as pointers to indicate the type of shift that needs to be done to the pixels in three planes. This study contains the experimental results that validate the superiority of this methodology compared to other existing ones in terms of imperceptibility, robustness and with reasonable embedding capacity. It is also found to be more resistant to steganalysis.

Fulltext PDF Fulltext HTML

How to cite this article
Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik’s Cube: A Way for Random Image Steganography. Research Journal of Information Technology, 5: 329-340.

Keywords: steganography, Rubik`s cube, information security, data hiding and Cryptography

INTRODUCTION

Human way of communication has come a long way from cave drawings and drums to electronic mails. As more and more information is communicated electronically, new needs, issues and opportunities are born. Authenticity and secret sharing are becoming the prime concerns (Abdulfetah et al., 2010; Zaidan et al., 2011). Data encryption (Salem et al., 2011; Schneier, 2007) and data hiding (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thanikaiselvan et al., 2011) are so increasingly being used to protect the sensitive data from disclosure when they are transmitted over an insecure channel.

Imperceptibility and high embedding capacity coupled with robustness are the three main criteria that decide the performance of any stego algorithm (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012). Imperceptibility and embedding capacity are the two main concerns of steganography while robustness is the prime concern of water marking (Amirtharajan et al., 2012; Abdulfetah et al., 2010; Stefan and Fabin, 2000; Zeki et al., 2011).

Data can be hidden in a grayscale (Amirtharajan and Rayappan, 2012a) or color (Gutub, 2010; Padmaa et al., 2011) image because slight changes to colors of pixels are imperceptible to the eye (Amirtharajan and Rayappan, 2012a-d). The principle of LSB substitution can be used to induce these changes, that is to embed data into the cover image. The modified image is known as stego image (Chan and Cheng, 2004). Given a color image each pixel is represented by three bytes. Each byte represents a color component, typically red, green, and blue (Padmaa et al., 2011). Furtive information, in bits, is veiled by laying it as LSBs in pixel bytes. The least significant bit is either a 0 or 1. The former is also the same. Hence, typically no more than half LSBs get altered through bits shrouding.

An improvement to basic LSB substitution is to hide a bit in a pixel only if the pixel satisfies certain conditions (Zanganeh and Ibrahim, 2011) or after randomization of the pixel (Zhao and Luo, 2012). Hmood et al. (2010a, b) described the capacity of information hiding and an overview about steganography. Luo et al. (2011) explains secret sharing and data hiding for clandestine information adopting block truncation coding in compressed images. Several methods are available in the literature for different cover objects (Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thenmozhi et al., 2012) like text (Al-Azawi and Fadhil, 2010; Xiang et al., 2011), image (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Luo et al., 2011; Mohammad et al., 2011), audio (Zhu et al., 2011) and video (Al-Frajat et al., 2010). Nevertheless a method is seldom considered for data hiding in scrambled images.

This study advises an unequalled model for image steganography in which Rubik’s cube theory is practised to scramble an image and then secret data entrenching is entitled using cyclic pixel indicator and LSB substitution.

PROPOSED METHOD

In this proposed methodology the pixels are first scrambled and then data is embedded based on their intensity values. For scrambling, the famous Rubik’s cube methodology is implemented (Yen and Lin, 2010). The three rows of a face of the Rubik’s cube are taken as the three components of the color pixel (Loukhaoukha et al., 2012). For instance, the first row is taken as red, the second row green and third blue. Based on the third and fourth bits of the bytes of a particular component, the other two components are scrambled by rotation. Then by using the first and second bits of a channel as pointer, embedding is carried out in the other two channels. This accounts for improved randomness that can resist any steganalysis (Qin et al., 2010). Embedding capacity is also enhanced as all the three channels are effectively used in hiding data.

A comparison of the original image and the stego image would show an attacker which bits have been modified and may serve as the basis of a successful attack on the hidden data. That is why the original image should be destroyed right after the stego image has been prepared.

This study wishes for a methodology of k = 2 bit embedding derived from the expertise of Rubik’s cube. The algorithm comprises of both image scrambling and embedding to pull off the aspiration of secret sharing. Scrambling procedure is defined which involves shifting of bits. The diagram of Rubik’s cube and its rotated and scrambled image is shown in Fig. 1.

Pixel indicator technique is used in this paper where indicator channel is cyclically chosen. The proposed block diagram is given in Fig. 2. Here, the secret data is embedded in to cover image which is scrambled using Rubik’s cube. The embedded image is descrambled as original image to get stego image. Then the stego image is scrambled using Rubik’s cube and then extracted to get the original data.

Fig. 1(a-c): (a) Rubik’s cube (b) Rotated Rubik’s cube and (c) Scrambled Rubik’s cube

Fig. 2: Block diagram for proposed method

Algorithm for embedding:

Algorithm for extraction:


Fig. 3: Move the first bit into the Temp

Fig. 4: Return the Temp value to Array

Fig. 5: Flow chart for embedding

The flow chart for embedding and extraction are given in Fig. 5 and 6, respectively. Here embedding and extraction process are explained in step by step manner.

RESULTS AND DISCUSSION

To justify the effectiveness of this study, the algorithm is simulated in MATLAB 7.1 with Lena, Baboon, Mahatma Gandhi and Temple as carrier images are depicted in Fig. 7a-10a with their corresponding stego images and accordingly their histograms are shown in 7b-10b. All images are of dimension 256x256x3 and approximately 30-35 kb in size.

Fig. 6: Flow chart for extraction

Here, pixel indicator technique is exploited to appreciate the goodness of the algorithm with the liberality in choosing the indicator for each embedding.

Tabulation for comparative results of MSE, PSNR, BPP and total number of bits embedded are tabulated in Table 1.

Thus, by fixing indicator channel, and based on that 2 bits are embedded in every iteration in each plane. As per the size and dimension of the images, MSE and PSNR values are vary in each plane.

Table 1: Comparative results of MSE, PSNR, BPP and total number of bits embedded

If we take Lena image, Green plane has the highest PSNR of 53.9904 and minimum of 49.6593 in Blue plane. If all four images are likened, Temple plane offers relatively high PSNR in all of its 3 planes. Approximately, BPP witnessed in these images is found to be 0.6660 which is fairly straight for constant bit embedding. More or less 130677 bits are embedded in each plane which says about the efficiency of the algorithm.

In order to make the readers understand this libretto apart from analytical results, histograms and stego images are also portrayed. One can notice that covers and their corresponding stegos remain identical without giving a clue about secret sharing. As a result, they possess far above the ground imperceptibility which is what needed the most in a steganographic run. Moreover, encryption algorithm is designed by taking Rubik’s cube fundamentals. This would create more complexity along with security as well.

This study is justified in terms of steganalysis also to prove the performance. One such attack is Chi-square which generally tests the competence of any algorithm by giving pictorial representation. Here, for performance analysis sake, Mahatma Gandhi image is exposed to the test and graphical results are obtained in Fig. 11.

The two curves represent cover and stego images. Before 50 rows the probability of embedding gradually minimizes to zero that clears the fact that the stego seems as if it contains no secret hidden in it. However, more care is taken in bringing up the obscurity, which is revealed in the graph given. In general, probability of 1 is when all rows undergo embedding and 0 if none.

Fig. 7(a-b): (a) Lena cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Fig. 8(a-b): (a) Baboon cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Fig. 9(a-b): (a) Mahatma Gandhi cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Fig. 10(a-b): (a) Temple cover image and its corresponding stego image and (b) Subsequent histograms for cover and stego images

Fig. 11: Graphical results for Mahatma Gandhi against chi square test

CONCLUSION

Rubik’s cube is a 3-D mishmash riddle, which has lent itself in discovering numerous theories and concepts in mathematics and engineering. This paper takes the idea of Rubik’s cube and formulates it in an image steganographic scheme. Secret data undergoes manipulation on some grounds of cryptography and further follows steganographic principles to share the secret. The experimental values show that this is one benevolent model for hiding secret in images. It also has the possibility of practical realization apart from owning secrecy and anonymity. The study is also tested against Chi-square to give good reason for. Thus, this study proposes a beneficial steganographic method when equated with previously available ones.

REFERENCES

  • Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad, 2010. Robust adaptive image watermarking using visual models in DWT and DCT domain. Inform. Technol. J., 9: 460-466.
    CrossRef    Direct Link    


  • Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    CrossRef    Direct Link    


  • Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRef    Direct Link    


  • Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37.
    CrossRef    Direct Link    


  • Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRef    Direct Link    


  • Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRef    Direct Link    


  • Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRef    Direct Link    


  • Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
    CrossRef    Direct Link    


  • Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRef    Direct Link    


  • Yen, E. and L.H. Lin, 2010. Rubik's cube watermark technology for grayscale images. Expert Syst. Appl., 37: 4033-4039.
    CrossRef    


  • Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
    CrossRef    Direct Link    


  • Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    CrossRef    Direct Link    


  • Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRef    Direct Link    


  • Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    CrossRef    Direct Link    


  • Loukhaoukha, K., J.Y. Chouinard and A. Berdai, 2012. A secure image encryption algorithm based on Rubik's cube principle. J. Electr. Comput. Eng.
    CrossRef    


  • Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
    CrossRef    Direct Link    


  • Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRef    Direct Link    


  • Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
    CrossRef    Direct Link    


  • Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRef    Direct Link    


  • Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRef    Direct Link    


  • Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784


  • Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK


  • Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link    


  • Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRef    Direct Link    


  • Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
    CrossRef    Direct Link    


  • Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRef    Direct Link    


  • Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
    CrossRef    Direct Link    


  • Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
    CrossRef    


  • Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
    CrossRef    Direct Link    


  • Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved