Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

Construction of the RDH Stegosystem Based on the Statistical Properties of Image Areas

https://doi.org/10.55648/1998-6920-2024-18-2-113-126

Abstract

This article discusses the reversible data hiding (RDH) method for raster images. The statistical properties of the container are taken into account by dividing the image into coherent regions using a wildfire method and collecting statistics of the least significant bits to form an embedded sequence with a given distribution. The INP interpolation method is used to divide the image into a part for collecting statistical properties of the container and a part for embedding information. Obtaining a sequence of bits with a given distribution is provided by an arithmetic decoder. The constructed stegosystem has an embedding capacity of 0.6 bits/pixel. RS steganalysis is carried out on the basis of BOSS_v1.01 images and the properties of the resulting containers are assessed based on visual distortion indicators.

About the Author

E. Yu. Merzlyakova
Siberian State University of Telecommunications and Information Science (SibSUTIS)
Russian Federation

Ekaterina Yu. Merzlyakova, PhD (Engineering), Docent of the Department of Applied Mathematics and Cybernetics

630102, Novosibirsk, Kirova str., 86, tel. +7 383 2698 272 



References

1. Gribunin V. G., Kostyukov V. E., Martynov A. P., Nikolaev D. B., Fomchenko V. N. Prikladnaya steganografiya: dlya studentov, aspirantov, nauchnykh rabotnikov, izuchayushchikh voprosy obespecheniya bezopasnosti informatsii [Applied steganography: for students, graduate students, researchers studying information security issues]. Sarov, Rossiiskii Federal'nyi yadernyi tsentr - Vserossiiskii nauchno-issledovatel'skii institut eksperimental'noi fiziki, 2021, 484 p.

2. Ryabko B. Unconditionally secure short key ciphers based on data compression and randomization. Designs, Codes, and Cryptography, 2023, vol. 91, no. 6, pp. 2201-2212.

3. Monarev V. A., Fionov A. N., Shokin Yu. I. Obzor sovremennykh teoretiko-informatsionnykh podkhodov k resheniyu osnovnykh zadach kriptografii i steganografii [Review of modern information-theoretic approaches to solving basic problems of cryptography and steganography]. Vychislitel'nye tekhnologii, 2010, vol. 15, no. 2, pp. 69-86.

4. Tutuncu K., Çataltaş Ö. Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach. Computer Science and Information Systems, 2021, vol. 18, no 4, pp. 1311-1332.

5. Talasila S., Vijaya Kumar G., Vijaya Babu E., Nainika K., Veda Sahithi M., Mohan P. The Hybrid Model of LSB-Technique in Image Steganography Using AES and RSA Algorithms. Soft Computing and Signal Processing, 2023, vol. 840, pp. 403–413.

6. Rajabi-Ghaleh S., Olyaeefar B., Kheradmand R., Ahmadi-Kandjani S. Image security using steganography and cryptography with sweeping computational ghost imaging. Frontiers in Physics, 2024, vol.12, no. 1336795.

7. Nechta I. V. Tsifrovaya steganografiya v programmakh i tekstovykh failakh [Digital steganography in programs and text files]. Moscow, Goryachaya liniya, Telekom, 2023, 112 p.

8. Novanto F., Nugraha A., Kurniawan J., Prayogo A. Optimizing Digital Image Steganography through Hybridization of LSB and Zstandard Compression. Sinkron, 2024, vol. 9, no. 1. pp. 75-82.

9. Wu W., Li H., A novel scheme for random sequential high-capacity data hiding based on PVD and LSB. Signal, Image and Video Processing, 2023, vol. 18, pp. 2277-2287.

10. Mali A., Dongre M. Block Based Self-Secured LSB Embedding Scheme for Reversible Steganography. IOT with Smart Systems, 2023, vol. 2, pp. 625-635.

11. Mohammad A., Al-Haj A., Farfoura M. An improved capacity data hiding technique based on image interpolation. Multimedia Tools and Applications, 2018, vol. 78, no. 6, pp. 7181-7205.

12. K. Jung, K. Yoo. Data hiding method using image interpolation. Computer Standards & Interfaces, 2009, vol. 31, no. 2, pp. 465-470.

13. Tripathi A., Prakash J. Interpolation Based Reversible Data Hiding using Pixel Intensity Classes. International Journal of Next-Generation Computing, 2023, vol. 14, no. 4, pp. 621-643.

14. Punia R., Malik A., Singh S. An interpolation-based reversible data hiding scheme for internet of things applications. Discover Internet of Things, 2023, vol. 3, no. 18.

15. Mohammad A. A. High quality interpolation-based reversible data hiding technique using dual images. Multimedia Tools and Applications, 2023, vol. 82, pp. 36713-36737.

16. Lee C-F., Huang Y-L. An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications, 2012, vol. 39, no. 8, pp. 6712-6719.

17. Konakhovich G. F., Puzyrenko A. Yu. Komp'yuternaya steganografiya: teoriya i praktika [Computer steganography: theory and practice]. Kyiv: MK-Press, 2006, 283 p.

18. Kumari L., Ramanathan Pandian., Rani J., Vinothkumar D., Sneha A., Amalarani V., Joe B. Selection of optimum compression algorithms based on the characterization on feasibility formedical image. Biomedical Research, 2017, vol. 28, no. 13, pp. 5633-5637.

19. Evsyutin O. O., Kokurina A. S., Meshcheryakov R. V., Obzor metodov vstraivaniya informatsii v tsifrovye ob"ekty dlya obespecheniya bezopasnosti v «internete veshchei» [Review of methods for embedding information into digital objects to ensure security in the Internet of Things]. Komp'yuternaya optika, 2019, vol. 43, no. 1, pp.137-154.

20. Kuri J., Rafi M. Securing Data in Internet of Things (IoT) using Cryptography and Steganography Techniques. International Journal for Research in Applied Science & Engineering Technology, 2020, vol. 8, no. 7, pp. 1933-1939.

21. Shelukhin O. I. Steganografiya. Algoritmy i programmnaya realizatsiya [Steganography. Algorithms and software implementation]. Moscow, Goryachaya liniya - Telekom, 2017, 592 p.

22. Fridrich J., Goljan M., Du R. Reliable Detection of LSB Steganography in Grayscale and Color Images. Special Session on Multimedia Security and Watermarking. Ottawa, Canada, 2001, pp. 27-30.

23. Pevny T., Bas P., Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, vol. 5, no. 2, pp. 215-224.

24. Holub V., Fridrich J. Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security, 2013, vol. 8, no. 12, pp. 1996-2006.

25. Sirota A. A., Dryuchenko M. A., Ivankov A. Yu. Stegoanaliz tsifrovykh izobrazhenii s is-pol'zovaniem metodov poverkhnostnogo i glubokogo mashinnogo obucheniya: izvestnye podkhody i novye resheniya [Steganalysis of digital images using shallow and deep machine learning methods: known approaches and new solutions]. Vestnik Voronezhskogo gosudarstvennogo universiteta. Seriya: Sistemnyi analiz i informatsionnye tekhnologii, 2021, no. 1, pp. 33-52.

26. Polunin, A. A., Yandashevskaya E. A. Ispol'zovanie apparata svertochnykh neironnykh setei dlya stegoanaliza tsifrovykh izobrazhenii [Using convolutional neural networks for steganalysis of digital images]. Trudy Instituta sistemnogo programmirovaniya RAN, 2020, vol. 32, no 4, pp. 155-164.

27. Ryabko B., Ryabko D. Information-theoretic approach to steganographic systems. IEEE International Symposium on Information Theory. Nice, France, 2007, pp. 2461-2464.

28. Vizil'ter Yu. V., Zheltov S. Yu., Bondarenko A. V., Ososkov M.V., Morzhin A.V. Obrabotka i analiz izobrazhenii v zadachakh mashinnogo zreniya: kurs lektsii i prakticheskikh zanyatii [Image processing and analysis in computer vision problems: a course of lectures and practical exercises]. Moscow, Fizmatkniga, 2010, 672 p.

29. Said A. Introduction to Arithmetic Coding – Theory and Practice. Hewlett-Packard Laboratories Report, USA, 2004, p. 64.

30. Baza BOSS izobrazhenii dlya issledovanii metodov steganografii [BOSS Image Database for Steganography Research], available at: http://agents.fel.cvut.cz/boss/index.php?mode=VIEW&tmpl=about (accessed 26.03.2024).

31. Mahasree M. Improved Reversible Data Hiding in Medical images using Interpolation and Threshold based Embedding Strategy. International Journal of Emerging Trends in Engineering Research, 2020, vol. 8, pp. 3495-3501.

32. Lu T.-C., Lin M.-C., Huang C.-C., Deng K.-M. Reversible Data Hiding Based on Image Interpolation with a Secret Message Reduction Strategy. International Journal of Computer Software Engineering, 2016, vol. 1, pp.124-130.

33. Eltysheva K., Fionov A. Stegosystem construction on the basis of statistical structure of covertext. XII International Symposium on Problems of Redundancy, St.-Petersburg, 26-30 May, 2009, pp. 180-185.

34. Ryabko B. Ya., Fionov A. N. Effektivnyi metod adaptivnogo arifmeticheskogo kodirovaniya dlya istochnikov s bol'shimi alfavitami [An Efficient Adaptive Arithmetic Coding Method for Sources with Large Alphabets]. Problemy peredachi informatsii, 1999, vol. 35, no. 4, pp. 1-14.

35. Zhilkin M. Yu. Teoretiko-informatsionnye metody stegoanaliza graficheskikh dannykh [Information-theoretic methods for steganalysis of graphical data]. Ph. D. thesis. Novosibirsk, 2009, 153 p.


Review

For citations:


Merzlyakova E.Yu. Construction of the RDH Stegosystem Based on the Statistical Properties of Image Areas. The Herald of the Siberian State University of Telecommunications and Information Science. 2024;18(2):113-126. (In Russ.) https://doi.org/10.55648/1998-6920-2024-18-2-113-126

Views: 227


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)