HOME JOURNALS CONTACT

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 373-382
DOI: 10.17311/rjit.2013.373.382
High Capacity Triple Plane Embedding: A Colour Stego
Rengarajan Amirtharajan, G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan

Abstract: In this study, we highlighted a new and efficient steganographic modus operandi based on pixel indicator routine to infix covert data in an RGB image. Usually when pixel indicator technique is employed on an RGB image, only one among the three planes (R, G and B) is labeled the indicant plane and the other two as depository planes in which the data can be stored. The proposed method is a similar concept by considering all the three planes for storage of the data instead of just two. This is carried out by using 5, 6 and 7 bits of a plane as indicator bits which increases the possible fields (from 4-8) to store the data. Because of this, the data embedding capacity of the image is improved to a greater extent since the indicator plane can also be used for embedding data in it. Optical Pixel Adjustment Process (OPAP) is also used here for reducing Mean Square Error. Furthermore the OPAP technique is not applied on the indicator plane as it modifies the indicator bits for reducing the MSE.

Fulltext PDF Fulltext HTML

How to cite this article
Rengarajan Amirtharajan, G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High Capacity Triple Plane Embedding: A Colour Stego. Research Journal of Information Technology, 5: 373-382.

Keywords: pixel indicator, image steganography, Data security and OPAP

INTRODUCTION

Nobody really owns the internet. It is a global collection of networks for which everyone has access to. These days internet has reached even remote villages. But the million dollar question that arises is ‘How safe is this internet nowadays?’ To make internet more secure and safe, along with the growth of information technology and communication, there has been a tremendous growth in technologies to secure this information too. Information hiding is the best possible way to secure confidential information (Cheddad et al., 2010; Stefan and Fabin, 2000; Qin et al., 2010).

Many different methods are invented to encrypt and decrypt data to keep our data secret. Few among them are Cryptography (Salem et al., 2011; Schneier, 2007), Steganography (Amirtharajan and Rayappan, 2012a-d; Amirtharajan et al., 2012; Bender et al., 1996; Cheddad et al., 2010; Janakiraman et al., 2012a, b; Rajagopalan et al., 2012; Thanikaiselvan et al., 2011; Thenmozhi et al., 2012), finger printing and water marking (Zeki et al., 2011). Cryptography is the art of scrambling of data in an unintended format so that no one other than the authorised receiver can decode it. It would look gibberish to any third person viewing it. But it has a disadvantage in that a person looking at it would find out that it is some encoded secret message (Zaidan et al., 2010). And if he gets hold of the secret code then any third person can extract it. Water marking is just for copy right protection and protection of intellectual property (Abdulfetah et al., 2010). The kind of data hidden in objects in the case of watermarking is a signature. This signature helps to signify the authority or ownership of the legal user. This study highlights about steganography and the algorithms used.

Steganography is derived from the Greek word ‘stegos’ meaning secret or something that is covered. ‘-graphy’ means art or drawing or writing, hence both put together means ‘a covered drawing’ (Al-Azawi and Fadhil, 2010; Luo et al., 2011; Mohammad et al., 2011; Zanganeh and Ibrahim, 2011; Zhao and Luo, 2012). Steganography is not new science. It has existed from the ancient times. In the olden days the secret messenger had his message encrypted in the form of tattoo and this was tattooed on his shaven head, thus, hiding the information from the third person. Only when the person’s head was shaven the image and the encrypted message could be decoded.

Ultimate aim of steganography is in the secure communication of the hidden data in a totally untraceable manner and to avoid any attention or suspicion to the transmission of the secret data. Apart from keeping others from knowing the hidden data, it should also prevent third persons from knowing that the secret data even exists. A simple classification is methods in spatial domain (Gutub, 2010; Padmaa et al., 2011) or transform domain (Amirtharajan and Rayappan, 2012d), but the cover object may be text (Xiang et al., 2011), video (Al-Frajat et al., 2010), audio (Zhu et al., 2011) or an image (Amirtharajan and Rayappan, 2012a-d; Cheddad et al., 2010). Aforementioned methods gives proper insight to steganography, in this study, a method is coined to improve the payload, imperceptibility with additional complexity in color image.

PROPOSED METHOD

The familiar method pixel indicator is proposed here by implementing new idea in that, by this way it improves embedding capacity as well as imperceptibility. It reduces the visual distortion by giving good image quality. In this method, number of bits embedded is defined by the user, say k-bit embedding. Indicator plane pixel bits tells that which plane is going to be a data plane. Two methods are introduced here; Red is taken as default indicator in method1. Method 2 uses the indicator plane cyclically. The block diagram of this study is shown in Fig. 1.

The flowcharts for embedding and extraction of the secret message are given in Fig. 2 and 3.

Fig. 1: Block diagram for the proposed method

Fig. 2: Flow chart for embedding the secret data

Embedding algorithm

Fig. 3: Flow chart for extracting the secret data

Extraction algorithm

RESULTS AND DISCUSSION

Four images are taken as covers namely Lena, Baboon, Mahatma Gandhi and Temple of size 256x256x3. The algorithm is executed in MATLAB 7.1 with k = 1, 2, 3, 4 bit for each image and the results are given in Fig. 4-9. MSE and PSNR values for each iteration along with bits embedded in each pixel and total embedding capacity for method 1 and 2 is given in Table 1 and 2, respectively. The tentative results for method 1 say that it has produced substantially high PSNR values for all the images which is well above the minimum standard of 38 dB. It also conveys that the resultant stego images are of fairly high quality and cannot attract naked eyes’ attention. Of these covers, Lena holds the record of having high PSNR value of 59.0357 for k = 1 bit embedding. BPP is also passably decent. For each k bit embedding sensible amount of bits are entrenched showing that the algorithm works well with good capacity with increased complexity and security as well.

Method 2 results are given in Fig. 7-9, respectively which makes use of cyclic indicator method wherein each plane is termed indicator for subsequent iteration. Thus each plane gets a chance of being the indicator channel. Though one can witness high MSE value in all images, it produces sensibly genuine embedding capacity. Moreover, since OPAP is called the level of distortion is made under control. Stego images as well as the histograms prove this with which it can be concluded that the paper is detected to be good when equated against the subsisting ones. Unlike method 1, method 2 gives equalized grandness to every panorama of steganography.

Both the methods are probed against Chi-square run. The graphical record of Mahatma Gandhi image is shown Fig. 10. The original cover and all the four stego outputs (for k = 1, 2, 3, 4) are represented. It is evident from the graph that with the increase in number of rows the probability decreases and 2, 3, 4 bit embedding curves show almost the same results as that of the original. For 1 bit embedding the probability reduces to zero only after 100 rows in the image. Partially contrary to method 1, method 2 exhibits splendid end results. All the resultants go hand-in-hand with the cover, thus, on seeing the images one cannot even sense that they have some secret entrenched in them. After some good number of rows for all the four embedding processes the probability is zero and remains the same for the rest of the image. Thus, this routine boasts about the well built constructs and is undoubtedly full-bodied against Chi-square test.

Complexity analysis: Advanced Encryption Standard (AES) is adopted for encrypting the confidential information, it acquaints 2^128 intricacy. Of 3 planes, one act as indicator and the other two function as data channels.

Fig. 4(a-d): Cover Images for method 1, (a) Lena, (b) Baboon, (c) Gandhi and (d) Temple

Fig. 5(a-d): Stego Images exhibiting maximum embedding capacity, (a) Lena (b) Baboon (c) Gandhi and (d) Temple

Fig. 6(a-e): Sample Results for a single image in method 1 (a) Cover image Mahatma Gandhi. Stego images for ‘K’ bit embedding, (b) K = 1, (c) K = 2 (d) K = 3 and (e) K = 4

Fig. 7(a-d): Cover Images for method 2, (a) Lena, (b) Baboon, (c) Gandhi and (d) Temple

Fig. 8(a-d): Stego images exhibiting maximum embedding capacity, (a) Lena, (b) Baboon, (c) Gandhi and (d) Temple

Fig. 9(a-e): Sample Results for a single image in method 2 (a) Cover image Mahatma Gandhi. Stego images for ‘K’ bit embedding, (b) K = 1, (c) K = 2, (d) K = 3 and (e) K = 4

Fig. 10(a-b): Graphical results for checking (a) Method 1, (b) Method 2 against chi-square attack

This is arranged in 3x2 ways. Of the total of 8 cases, there is no embedding done for 000. This makes the total cases as 7. As a result, the total embedding complexity is given by 2^128x3x2x(8/7)x(32+(64/7)+(32/7)+(128/35)+(32/7)+(64/7)+32+256).

Table 1: MSE, PSNR, BPP and embedding capacity for method 1

Table 2: MSE, PSNR, BPP and embedding capacity for method 2

CONCLUSION

The process of embedding secret data based on indicator-plane increases the embedding entropy considerably. OPAP decreases the Mean Square Error (MSE) thus making the stego image indistinguishable with the Cover. Thus, the proposed method which is an amalgam of the above mentioned methods, it incorporates reduction of delectability and increase of entropy at the same time. Imperceptibility, capacity is the major expectation in image steganography both is excellent in this study.

REFERENCES

  • Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad, 2010. Robust adaptive image watermarking using visual models in DWT and DCT domain. Inform. Technol. J., 9: 460-466.
    CrossRef    Direct Link    


  • Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    CrossRef    Direct Link    


  • Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRef    Direct Link    


  • Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRef    Direct Link    


  • Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRef    Direct Link    


  • Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRef    Direct Link    


  • Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRef    Direct Link    


  • Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    CrossRef    Direct Link    


  • Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
    CrossRef    Direct Link    


  • Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRef    Direct Link    


  • Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
    CrossRef    Direct Link    


  • Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRef    Direct Link    


  • Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRef    Direct Link    


  • Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784


  • Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK


  • Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link    


  • Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRef    Direct Link    


  • Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
    CrossRef    Direct Link    


  • Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRef    Direct Link    


  • Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
    CrossRef    Direct Link    


  • Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
    CrossRef    


  • Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
    CrossRef    Direct Link    


  • Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved