Back
 JIS  Vol.7 No.3 , April 2016
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
Abstract: Steganography is the art of hiding a secret message in some kind of media. The main goal is not to hide only the secret message but also the existence of communication and secure data transferring. There are a lot of methods that were utilized for building the steganography; such as LSB (Least Significant Bits), Discrete Cosine Transform (DCT), Discrete Fourier Transform, Spread-Spectrum Encoding, and Perceptual Masking, but all of them are challenged by steganalysis. This paper proposes a new technique for Gray Scale Image Steganography that uses the idea of image segmentation and LSB to deal with such problem. The proposed method deals with different types of images by converting them to a virtual gray scale 24 bitmaps, finds out the possible segments inside image and then computes the possible areas for each segment with boundaries. Any intruder trying to find the transformed image will not be able to understand it without the correct knowledge about the transformation process. The knowledge is represented by the key of image segmentation, key of data distribution inside segment (area selection), key of mapping within each area segment, key agreement of cryptography method, key of secret message length and key of message extension. Our method is distinguishing oneself by one master key to generate the area selection key, pixels selection keys and cryptography key. Thus, the existence of secret message is hard to be detected by the steganalysis. Experiment results show that the proposed technique satisfied the main requirements of steganography; visual appearance, modification rate, capacity, undetectability, and robustness against extraction (security). Also it achieved the maximum capacity of cover image with a modification rate equals 0.04 and visual quality for stego-image comparable to cover image.
Cite this paper: Bawaneh, M. and Obeidat, A. (2016) A Secure Robust Gray Scale Image Steganography Using Image Segmentation. Journal of Information Security, 7, 152-164. doi: 10.4236/jis.2016.73011.
References

[1]   Sneha, B. and Gunjan, B (2014) Data Encryption by Image Steganography. International Journal of Information and Computation Technology, 4, 453-458.
http://www.irphouse.com/ijict.htm

[2]   Abdelwahab, A.A. and Hassaan, L.A. (2008) A Discrete Wavelet Transform Based Technique for Image Data Hiding. Radio Science Conference, Egypt, March 2008, 1-9.

[3]   Nilizadeh, A.F. (2013) Steganography on RGB Images Based on a Matrix Pattern Using Random Blocks. International Journal of Modern Education and Computer Science, 4, 8-18.
http://dx.doi.org/10.5815/ijmecs.2013.04.02

[4]   Chang, C.-C., Lin, P.-Y. and Chuang, J.-C. (2010) A Grayscale Image Steganography Based upon Discrete Cosine Transformation. Journal of Digital Information Management, 8, 88-94.

[5]   Kadry, S. and Nasr, S. (2013) New Generating Technique for Image Steganography. Lecture Notes on Software Engineering, 1, 190-193.
http://dx.doi.org/10.7763/LNSE.2013.V1.43

[6]   Bawaneh, M.J. (2014) A Novel Approach for Image Steganography Using LCG. International Journal of Computer Applications, 102, 34-38.

[7]   Juneja, M. and Sandhu, P.S. (2013) An Improved LSB Based Steganography Technique for RGB Color Images. International Journal of Computer and Communication Engineering, 2, 513-517.
http://dx.doi.org/10.7763/ijcce

[8]   Asthana, A. and Johri, S. (2012) An Adaptive Steganography Technique for Gray and Colored Images. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 340-345.

[9]   Farn, E.-J. and Chen, C.-C. (2009) Novel Steganographic Method Based on Jig Swap Puzzle Images. Journal of Electronic Imaging, 18, Article ID: 013003.
http://dx.doi.org/10.1117/1.3073979

[10]   Sharma, V.K. and Shrivastava, V. (2012) A Steganography Algorithm for Hiding Image in Image by Improved Lsb Substitution by Minimize Detection. Journal of Theoretical and Applied Information Technology, 36, 1-8.

[11]   Udhayavene, S., Dev, A.T. and Chandrasekaran, K. (2015) New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length). Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015).
www.sciencedirect.com
http://dx.doi.org/10.1016/j.procs.2015.06.093


[12]   SandipSadashiv, S. and Rao, P.V. (2015) A Steganographic Method by Using Adaptive Algorithm for Gray Scale Images. International Journal of Electrical, Electronics and Computer Systems (IJEECS), 3, 9-13.

[13]   Ballesteros, D.M., Renza, L.D. and Rincon, R. (2015) Gray-Scale Images within Color Images Using Similarity Histogram-Based Selection and Replacement Algorithm. Journal of Information Hiding and Multimedia Signal Processing, 6, 1156-1166.

[14]   Raju and Dhanda, M. (2015) An Improved LSB Based Image Steganography for Grayscale and Color Images. International Journal of Current Engineering and Technology, 5, 3295-3297.

[15]   Prajapati, H.A. and Chitaliya, N.G. (2015) Secured and Robust Dual Image Steganography: A Survey. International Journal of Innovative Research in Computer and Communication Engineering, 3, 30-37.

[16]   Byron, M.J.T. (1984) Elements of Simulation. Chapman and Hall, USA, 57-64.

[17]   Stallings, W. (2005) Cryptography and Network Security Principles and Practices. 4th Edition, Prentice Hall, Upper Saddle River, 36-38.

[18]   Hearn, D.D. and Baker, M.P. (1994) Computer Graphics. 2th Edition, Pearson, A Paramount Commercial Company Englewood Cliffs New Jersey, 219-220.

 
 
Top