1. Trang chủ
  2. » Luận Văn - Báo Cáo

A data hiding approach based on reference affected matrix

12 12 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 12
Dung lượng 383,98 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Three parts: petal matrix, calyx matrix, and stamen matrix are combined for data embedding by using the x-cross-shaped reference matrix.. The low distortion and the high capacity are two

Trang 1

A Data Hiding Approach Based

on Reference-Affected Matrix

Trong-The Nguyen, Jeng-Shyang Pan, Truong-Giang Ngo and Thi-Kien Dao

Abstract Data security has got many remarkable achievements However, the issues

of the lower distortion and the higher embedding capacity in the embedded secret data in media have not much been considered by scholars This paper proposes a

new data hiding approach to the embedded secrets based on the guidance of the

x-cross-shaped reference-affected matrix to solve these issues Adjacent pixels would

be found out large area with similar values which can utilize for manipulating data embedding and extracting on a difference–coordinate plan instead of the traditional pixel–coordinate plan Three parts: petal matrix, calyx matrix, and stamen matrix are combined for data embedding by using the x-cross-shaped reference matrix The experimental results compared with the previous methods in the literature shows that the proposed approach brings outstanding payload with the cover visual quality

Keywords Steganography·Data hiding·Data embedding and extracting

6.1 Introduction

Secret messages delivered to target destination need prevent from malicious attacks,

so data hiding technique is one of the accessible ways [1] Data hiding technique,

a significant subject of information security, is widely used to transfer secret mes-sages to others safely on public channels instead of highly costly and conspicuous private channels [2] Data hiding focuses on finding a secure way to embed secrets

in multimedia Pictures, known as common multimedia, can be a perfect means to

T.-T Nguyen (B) · J.-S Pan · T.-K Dao

Fujian Provincial Key Lab of Big Data Mining and Applications, Fujian University of

Technology, Fuzhou, Fujian, China

J.-S Pan

Department of Information Technology, Haiphong Private University, Haiphong, Vietnam

© Springer Nature Singapore Pte Ltd 2020

J.-S Pan et al (eds.), Advances in Intelligent Information Hiding and Multimedia

Signal Processing, Smart Innovation, Systems and Technologies 156,

https://doi.org/10.1007/978-981-13-9714-1_6

53

Trang 2

carry secret messages At the current stage in steganography, grayscale images are common and convenient carriers Owing to the value of every grayscale image pixel ranging from 0 to 255, so a pixel is easily represented by 8 bits in a binary system [3,4]

The low distortion and the high capacity are two aspects included the lower distor-tions of images estimate data hiding method’s performance after embedding secrets and the higher capacity of carrying secret messages Generally, a higher embedding capacity will result in higher distortions of stego-images, and vice versa Thus, how

to find a feasible way to make a trade-off is a big problem that arises from the data hiding The often steganography method used the least-significant bits (LSB) of each cover pixel’s value from a host image to carry a secret message LSB for data hiding

is the simple and achievable methods with a satisfactory capacity of carrying secret digits and the escapable view from human eyes However, they are vulnerable one under the malicious attacks based on the statistical analysis [5]

Modified LSB method (LSB to match a revisited approach) devoted to controlling the distortion of host images at a lower level with the same payload The stego-images generated under the guidance of both of the corresponding two original images’ pixels and two secret digits that performed better in visual imperceptibility apparently in comparison with traditional LSB one [6] The exploiting modification direction (EMD) [7] method in which each unit composed of n pixels of a host

image can carry one secret digit in (2n+ 1)-ary notational system during embedding processes every time and only one pixel of the unit is modified by 1 every time Therefore, it shows a larger payload and better quality of stego-images

Further, in order to improve the ability of payload, the turtle-shell methods [8,9] provided an easy way to establish a layout (like a turtle shell), so every secret digit ranging from 0 to 8 can be embedded by 2 pixels each time The regular-octagon shape [10], the other method similar to turtle-shell one, had improved the capacity of carrying secret digits This paper places an x-cross-shaped reference matrix extended

on a pixel–differencing plan to hide the secret that combined from three parts: petal matrix, calyx matrix, and stamen matrix for secret embedding, and payload with good visual quality

The remaining paper is organized as sections Section6.2presents related work Section6.3states the methodology Section6.4discusses the experimental results

A conclusion is summarized in Sect.6.5

The definition of symbols is used in this paper as follows

Cover/host image Represents the original grayscale image

Trang 3

Stego-image Represents the grayscale image after embedding a secret

mes-sage

i Represents the index of pixels.(p i−1, p i , p i+1): a triple of

con-secutive cover pixels

d1, d2 Represents the difference values of pixel pairs (p i−1, p i ) and

(p i+1, p i ) from a cover image, respectively.

M (d1, d2) Represents the value with the guidance of x-cross-shaped

refer-ence matrix

pi Represents the stego-pixel of pi after carrying secret by

least-significant bit substitution method

d1, d

2 Represents the difference values of pixel pairs 

p i−1, p

i

 and



p i+1− p

i

 , respectively

pi−1, p

i+1 Represents the stego-pixel values of pi−1and pi+1after

embed-ding secret, respectively

l s Represents the length of a secret that we are going to hide

M (d

1, d

2) Represents the value of the secret we are going to embed from

the reference matrix

num Represents the number of statistics in the histogram

6.2.1 EMD Scheme

A(2n + 1)-ary notational secret data could be embedded for EMD scheme [7,11]

under a group of n cover pixels from the host image every time that achieve efficiency

embedding and secrecy with low distortions EMD’s embedding procedure included steps: First, divide a cover image into a series of nonoverlapping groups Each group

is composed of n pixels which are G = (p1, p2, , p n ) Second, convert a binary

secret message into a sequence of secret digits in (2n+ 1)-ary notational system

Every secret digit can be shown as s j ( j = 1, 2, , l), where l depends on n Apply

EMD to the group G by Eq (6.1) where “mod” represents a modulo operation.

Equation (6.2) calculates how to carry a (2n+ 1)-ary secret digit sj

= f (p1, p2, , p n ) =

 n



i=1

(p i i )



mod (2n + 1) (6.1)

D=sj − y mod (2n + 1) (6.2)

By adding or subtracting, one is used to evaluate changes for certain pivalue of

G.

Trang 4

p i =

p i , i f s j= ρ

p D + 1, i f s j = ρ, and D ≤ n

p (2n+1)−D − 1, i f s j = ρ, and D ≤ n

(6.3)

Demonstration, when n = 2, e.g., if the cover pixel pair is (p1, p2) = (1, 2),

ρ is 0 according to Eq (6.1) When the to-be-embedded secret digit sj = 2, the stego-pixel pair will be

p1, p 2



= (1, 3) according to Eqs (6.2) and (6.3) When the receiver wants to extract the secret, they can also utilize the function shown in

Eq (6.1) That is, the secret digit 2 can be extracted This method ensures a high

data payload (about 1.16 bpp when n= 2) and a good image quality (about 52 dB measured by peak signal-to-noise ratio, often abbreviated PSNR)

6.3 Turtle-Shell-Based Scheme

Every two pixels can carry a secret data ranging from(000)2to(111)2 each time

in the scheme of turtle shell [8] A reference matrix 256× 256 containing as many turtle shells as possible is to hide the secret data Each turtle shell is a hexagon that contains eight different distinct numbers ranging from 0 to 7, including six edge

digits and two back digits Matrix turtle shell (symbol is M) is arranged one by

one without overlapping The rule is the upper row is set to 2, and the next value difference is set to 3, and then continuously it is to 2 again Alternately, add 2 and 3 to every row to complete the entire matrix Therefore, the value difference between two adjacent numbers in the same row of the reference matrix is set to “1”, and the value difference between two adjacent numbers in the same column is set alternately to “2” and “3” Continuously, write down 0 to 7 in every row Every turtle shell contains eight numbers ranging from(000)2to(111)2, so that each cover pixel pair is expressed

as (p i , p i+1), which can carry a 3-bit digit s j Assume that the grayscale cover image I with sized of H × W is composed by I = {pi |i = 1, 2, , (H × W)}.

To embed secret digits, the location of each pixel pair(p i , p i+1) will be determined

as M (p i , p i+1) in the reference matrix M, where p i and pi+1are the column value and row value, respectively

Our schemes work according to using three pixels every time with the guidance of the cross-shaped reference matrix under a difference–coordinate system The x-cross-shaped reference matrix combines three parts: petal matrix, calyx matrix, and stamen matrix for secret embedding, which brings a great payload with cover visual quality

Trang 5

6.5 Matrix Construction Procedure

A coordinate system(d1, d2), where d1and d2range from−255 to 255, represents the difference–value of pixel pairs(p i−1− pi ) and (p i+1− pi ), respectively There

is a large number of difference–values are close to 0s, due to the feature of images

that adjacent pixels have nearly similar values Therefore, when d1and d2range from

−1 to 1, a 3 × 3 is arranged as rectangle-shaped matrix called stamen matrix which

is marked in orange Every pair of(d1, d2) in the stamen matrix can carry a secret

digit ranging from(000)2to(111)2

(1, d2) = d1 + 3d2 + 4 mod 8, if d1,2 ∈ {−1, 0, 1} (6.4)

Then, settle the second part of the big matrix, when either d1or d2is equal to 0 The calyx matrix is marked in blue as shown in Fig.6.1 Equation (6.5) describes the calyx matrix

M (d1, d2) = d1 mod 4 , i f d1{−1, 0, 1}, d2 = 0

d2 mod 4, i f d1= 0, d2 /∈ {−1, 0, 1} (6.5)

The positive axis of d1ranges from 2 to 255, and the negative axis of d1ranges from−2 to −255; meanwhile, d2is set 0 The other two calyxes on the positive axis

7 6 5 4 3 2 1 0 1 2 3 4 5 6 7

2 1 0 31 30 29 28 1 28 29 30 31 0 1 2

29 28 27 26 25 24 23 2 23 24 25 26 27 28 29

23 22 21 20 19 18 17 3 17 18 19 20 21 22 23

17 16 15 14 13 12 11 0 11 12 13 14 15 16 17

11 10 9 8 7 6 5 1 5 6 7 8 9 10 11

6 5 4 3 2 1 0 2 0 1 2 3 4 5 6

6 5 4 3 2 1 0 2 0 1 2 3 4 5 6

11 10 9 8 7 6 5 1 5 6 7 8 9 10 11

17 16 15 14 13 12 11 0 11 12 13 14 15 16 17

23 22 21 20 19 18 17 3 17 18 19 20 21 22 23

29 28 27 26 25 24 23 2 23 24 25 26 27 28 29

2 1 0 31 30 29 28 1 28 29 30 31 0 1 2

7 6 5 4 3 2 1 0 1 2 3 4 5 6 7

d1

Fig 6.1 The designed scheme based on a reference-affected matrix

Trang 6

and on the negative axis of d2could be obtained by transposing calyxes, respectively.

Every element M (d1, d2) in these calyxes can carry secret digits from (00)2to(11)2 The major arranging area of the matrix known as petal is marked in green as shown in Fig.6.1 Every its column is set difference value as 1, and the range is from

0 to 31 and every row sets in turn difference value as 5, 6, 6, 6, and 6, and the range

is from 0 to 31 The whole matrix called x-cross-shaped reference matrix composed

of petal matrix, calyx matrix, and stamen matrix as shown in Fig.6.1

6.6 Payload Calculation

Once information hiding needs to conduct in an unreliable environment, that the total volume of secret messages will be expected as much as possible during one transmission Each cover image’s payload depends on the resolution of the host image The steps of a calculating procedure for the secret message are the following:

Step 1 Extract a triple of consecutive cover pixels (p i−1, p i , p i+1), where i =

2, 5, , (W × H − (W × H mod 3) − 1) Convert a message S to a bit

stream First, extract three bits from the secret string and embed the segment

into the host image using pi by LSB substitution method, and update ls =

l s + 3, where lsrepresents the length of the secret string which is going to

be embedded into a cover image Relative to pi is a cover pixel, and then p i

is a camouflaging pixel

Step 2 Calculate the difference values d1= pi−1− p

i and d2= pi+1− p

i, respec-tively

Step 3 Recognize M(d1, d2) belonging to which part of the x-cross-matrix: If it

belongs to the calyx area, then ls = ls+ 2; if it belongs to the stamen part,

l s = ls + 3; otherwise, ls = ls + 5, which means it belongs to the petal matrix

Step 4 Repeat from Steps 1 to 3 until all pixels in the cover image are completely

processed Return the payload length ls.

Our scheme embeds a 3-bit sub-secret string to the LSB pixel of pi, and we also embed

a ls-bit sub-secret string to the pair of difference values (d1, d2) The binary value s

is converted to its corresponding decimal value sd The length lsof to-be-embedded

secret data s depends, on where the pair (d1, d2) locates on the flow-shaped reference

matrix

A secret message is embedded in a binary system into a host image During the procedure of embedding a secret, our scheme is efficient due to the embedding time less than 25 s with more than 2.6 bit per pixel (bpp)

Trang 7

Step 1 Extract a triple of consecutive cover pixels (p i−1, p i , p i+1), where i =

2, 5, , (W × H − (W × H mod 3) − 1).

Step 2 Embed three bits of secret message into the LSB of p ito generate a

stego-image pixel p i Then, compute d1= pi−1− p

i , d2= pi+1− p

i

Step 3 If the decimal secret s d is equal to M (d1, d2), then keep d1, d2unchanged;

otherwise, embed sdas the following rules:

Case 1 M (d1, d2) belongs to the petal matrix, which means this pair

of (d1, d2) can carry five digits of secret message ranging from (00000)2 to (11111)2 While the sub-secret sd is unequal to

M (d1, d2), find the paird1, d

2

 which has the shortest distance with(d1, d2) and is equal to sub-secret s d with the guidance of matrix x-cross Change (d1, d2) to d1, d

2

 later, according to

d1 = p

i−1 − p

i , d2 = p

i+1 − p

i, to generate the stego-pixels:

p i−1 and pi+1

Case 2 M(d1, d2) belongs to the stamen matrix, which means this pair

of(d1, d2) can carry three digits of secret message ranging from (000)2to(111)2 While the sub-secret sd is unequal to M (d1, d2),

find the pair

d1, d 2



that is equal to sub-secret sd with the guid-ance of matrix x-cross Change(d1, d2) tod1, d

2

 later, according

to d1=p

i−1 − p

i , d2 = p

i+1− p

i, to generate the stego-pixels:

p i−1 and pi+1

Case 3 M (d1, d2) belongs to the calyx matrix, which means this pair of

(d1, d2) can carry two digits of secret message ranging from (00)2

to(11)2 While sub-secret sd is unequal to M (d1, d2), find the pair



d1, d 2



that is equal to sub-secret sdwith the guidance of matrix x-cross Change(d1, d2) tod1, d

2



later, according to d1= p

i−1−p

i,

d2 = p

i+1 − p

i , to generate the stego-pixels: pi−1 and p i+1

So far, the triple of consecutive stego-pixels

p i−1, p

i , p

i+1

 are generated

Step 4 Repeat Steps 1–4 until all secret messages are embedded We obtain the

stego-image finally

For example: Once embedding a secret digit “3” by the x-cross-shaped refer-ence matrix, and a secret digit “7” by LSB substitution under the triple cover pix-els(p i−1, p i , p i+1) = (79, 74, 82), the LSB substitution procedure changes the

central pixel from 74 (1001010)2 to 79 (1001111)2 such that

p i−1, p

i , p i+1

=

(79, 79, 82) Then compute (d1, d2) = (0, 3), and find M(0, 4) is 3, so that



d1, d

2



= (0, 4), and finally change the stego-vector p i−1, p

i , p

i+1



=

(79, 79, 83) If we want to embed a secret digit “2” by the x-cross-shaped reference

matrix, the procedure flowchart of calculating the length of the secret message 4, and

a secret digit “5” by LSB substitution under the triple cover pixels(p i−1, p i , p i+1) = (77, 74, 77), the embedding procedure first hasp i−1, p

i , p i+1

= (77, 77, 77),

next compute(d1, d2) = (0, 0), and lastd1, d

2



= (−1, 1) Therefore, the triple

stego-pixels are

pi−1, p

i , p

i+1



= (78, 77, 76) If embedding a secret digit “14”

Trang 8

the x-cross-shaped reference, and a secret digit “7” by LSB substitution under the triple cover pixels(p i−1, p i , p i+1) = (49, 45, 50), apply LSB procedure to change



p i−1, p

i , p i+1

= (49, 47, 50) and compute (d1, d2) = (2, 3), so thatd1, d

2



=

(3, 4) At last, the triple stego-pixels arepi−1, p

i , p

i+1



= (50, 47, 51).

6.8 Secret Extraction Procedure

First, select the triple of consecutive stego-pixels

p i−1, p

i , p

i+1

 , from a

stego-image The secret data can be obtained from the three least-significant bits of p i

Second, compute d1 = p

i−1− p

i and d2 = p

i+1− p

i Based on the location indication

of the two values

d1, d 2



on the x-cross-shaped reference matrix, M

d1, d 2



is the secret data Whole secret message could be archived by repeating to process the secret extraction procedure Assume

pi−1, p

i , p

i+1

 from a stego-image is (83, 79,

79) According to the extraction procedure, we can extract secret “7” (111)2 from p i

and “3” (11)2 from

d1, d 2

 , respectively What about the triples

p i−1, p

i , p

i+1



=

(78, 77, 76)? Secret data “5” (101)2 and “2” (101)2 can be extracted from p

i and



d1, d

2



, respectively Let us look at what the secret message will be extracted from the

pi−1, p

i , p

i+1



= (51, 47, 50), which are “7” (111)2 from p

i = 47 and “14” from

d1, d

2



= (4, 3).

6.9 Experimental Result

Two measuring parameters are used in the experiment to quantify the performance

of the proposed method included: the embedding capacity (EC) and peak signal-to-noise ratio (PSNR) EC is the number of secret data embedded in a test image, and PSNR is a kind of objective criteria for the evaluation of the image (greater PSNR

is the better quality of the image)

PSNR= 10 log10

2552

M S E

(6.6)

H × W

H



i=1

W



j=1



p i , j − p

i , j



(6.7)

where H and W represent the height and width of the cover image, respectively, pi , j represents the original cover pixels, and p i, jrepresents the camouflage image pixels, respectively The process of embedding payload and image quality is as follows: First, divide each test image into 4 × 4 nonoverlapping blocks Second, calculate the block standard deviations Third, use the histogram to present the relationship between the standard deviation and the number of blocks

Trang 9

Table6.1shows a comparison of the experimental results of embedding secret information into two categories of the image Apparently, the smooth regions are more suitable for embedding secret information due to the smaller difference between the pixel values

Figure6.2shows the calculation of the block standard deviations for images that use six 512× 512 grayscale test images The category of smooth images has the block standard deviations that are mostly around 0s The category of complex images has variances block standard deviations are hardly around over 0

Table6.2shows the comparison of results of the experiments of the proposed scheme with the turtle-shaped scheme [8] and the regular-octagon scheme [10] Obvi-ously, the performance of the proposed scheme provides outstandingly the results Figure6.3compares the original image of bridge with its camouflage one that has low PSNR of 38.1356(dB) Though the image ofbridge is classified as a complex image, with human being’s eyes is difficult to recognize the difference between the original image and the stego-image

Table 6.1 Smooth images and complex images PSNR and payload

Fig 6.2 Calculation of the block standard deviations for smooth and complex images

Trang 10

Table 6.2 Comparison of the proposed scheme with the turtle-shaped scheme and the

regular-octagon scheme

[ 10 ]

Fig 6.3 Original image and stego-image based on bridge

Figure 6.4 shows the histograms of six 512 × 512 grayscale test images for identifying image types The experimental results of embedding payload and image quality demonstrate that the proposed method is a competitor of embedding secret data scheme

In this paper, we proposed a new scheme of embedding secrets information to solve the issues of low distortion and high embedding capacity in the embedded secret data in media The guidance of the x-cross-shaped reference-affected matrix was applied for embedding capacity in transferring more secret messages Adjacent pixels

in a large area of the matrix with similar values can utilize for manipulating data

... x-cross-shaped reference- affected matrix was applied for embedding capacity in transferring more secret messages Adjacent pixels

in a large area of the matrix with similar values can utilize... standard deviations for images that use six 512× 512 grayscale test images The category of smooth images has the block standard deviations that are mostly around 0s The category of complex images...

Trang 9

Table6.1shows a comparison of the experimental results of embedding secret information into two categories

Ngày đăng: 24/11/2020, 00:51

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN