SSRN Id3171494
SSRN Id3171494
SSRN Id3171494
Abstract:
Steganography and Steganalysis is an information hiding technique for data protection and security from unauthorized access and use. Steganography is
defined as the art and science of covert information in plain sight in various media sources such as text, images, audio, video, network channel etc. so, as
to not stimulate any suspicion; while steganalysis is the science of attacking the steganographic system to reveal the secret message. Steganography is
often designed as a trade-off between robustness, imperceptibility and message payload hiding capacity. The paper provides detailed review of the current
trends in digital image steganography, where the secret message is embedded in image cover source and analysis of the different approaches along with
the impact on the choice of embedding algorithm, image cover selection, the image performance metrics with extensive focus given to adaptive image
steganography, which is currently the most secure steganographic system applicable in spatial, transform and side-informed steganography. The research
contributions have been summarized, with directions to future improvement.
Keywords:
Information hiding; Digital image steganography; Evaluation criteria; Image quality metrics; Adaptive steganography; Steganalysis
Videos
Cryptography
Others
(Linguistics Digital Images batch Steganography
steganography, network
steganography)
Steganography
Imperceptible
Watermarking
Fragile Visible
𝑇𝑃
𝑇𝑃 𝑟𝑎𝑡𝑒 = (5)
(𝑇𝑃+𝐹𝑁)
2. Performance Evaluation 𝐹𝑃 𝑟𝑎𝑡𝑒 =
𝐹𝑃
(6)
𝑇𝑁+𝐹𝑃
(𝑇𝑃𝑠+𝑇𝑁𝑠)
A steganographic system must ensure “covert” communication; it is 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (7)
𝑇𝑃𝑠+𝑇𝑁𝑠+𝐹𝑃𝑠+𝐹𝑁𝑠
considered secure if the steganalyer in general is unable to differentiate 𝑇𝑃𝑠
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = (8)
between the cover image and stego image. The performance evaluation 𝑇𝑃𝑠+𝐹𝑃𝑠
1
𝑀𝑀𝐷(𝐹, 𝑋, 𝑌) = 𝑠𝑢𝑝𝑓∈𝐹 ( ∑𝑁 𝑁
𝑖=1 𝑓( 𝑥𝑖 ) − 1/𝑁 ∑𝑖=1 𝑓( 𝑦𝑖 )) (9)
𝑁
(𝑃𝑋 (𝑔)
𝐷(𝑃𝑋 ||𝑃𝑌 ) = ∑𝑔∈𝐺 𝑃𝑋 (𝑔) 𝑙𝑜𝑔 (10)
(𝑃𝑌 (𝑔))
∞
𝑀(𝑥) = ∫−∞ 𝑝(𝑡) 𝑒𝑥𝑝(𝑡𝑥) 𝑑𝑡 (11) Fig. 5 - (a) RS analysis indicates detectability (b) RS analysis
indicates robustness
Subjective Objective
Reduced
Double stimulus Full reference No Reference
Reference
Structural
Mathematical
Single stimulus HVS based Information Graphical based
metric
change(SSIM)
SSIM(x, y) = (2𝜇𝑥 𝜇𝑦 + 𝐶1 )(2𝜎𝑥𝑦 + 𝐶2 )/(𝜇𝑥2 + 𝜇𝑦2 + 𝐶1 )( 𝜎𝑥2 + 𝜎𝑦2 + 𝐶2 ) Transform (DWT), Hadamard Transform, Dual tree DWT, Double
(15) Density Dual Tree DWT (DD DT DWT) Transform, Integer Wavelet
𝜇𝑥 , 𝜇𝑦 = 𝑚𝑒𝑎𝑛 𝑖𝑛𝑡𝑒𝑛𝑠𝑖𝑡𝑖𝑒𝑠 𝑜𝑓 𝑐𝑜𝑣𝑒𝑟 𝑎𝑛𝑑 𝑠𝑡𝑒𝑔𝑜 𝑝𝑖𝑥𝑒𝑙 Transform, Ridgelet Transform, Curvelet Transform etc which are then
𝜎𝑥 , 𝜎𝑦 = 𝑚𝑒𝑎𝑛 𝑖𝑛𝑡𝑒𝑛𝑠𝑖𝑡𝑖𝑒𝑠 𝑜𝑓 𝑐𝑜𝑣𝑒𝑟 𝑎𝑛𝑑 𝑠𝑡𝑒𝑔𝑜 𝑖𝑚𝑎𝑔𝑒 𝑏𝑙𝑜𝑐𝑘 subjected to an optimal embedding technique to modify the coefficients.
Soft computing tools, genetic algorithm and game theory is often
• Graphical Measure: It is a bivariate image quality assessment considered for this purpose [2] [18]. The transform domain methods are
metric which calculates the distance between the singular values of more immune to image processing operations and hence prove less
the cover image blocks and the distorted stego image block. [7][11] susceptible to steganalytic attacks. Therefore, it is more popular and are
usually preferred over spatial domain methods. Spread spectrum
4. Image Steganography Techniques steganography is a blind scheme that embeds in the noise inherent during
the image acquisition process. It incorporates image restoration and error
Digital image steganography can be broadly categorized into spatial control techniques can be used while extracting the data at the decoder
domain, transform domain, side-informed based steganography, spread side as it doesn’t require the original image while extraction and
spectrum and adaptive steganography as depicted in Fig 8. In spatial outperforms other methods in terms of payload capacity and invisibility,
domain, secret message is embedded in the pixel value of the cover image but tends to be labor intensive. Adaptive based steganography methods
directly [60-63] whereas transform domain methods first transforms the establish a statistical model of the cover image. It is also known as model
cover image from spatial to frequency domain using any one of the based steganography and statistics aware embedding. It has recently
transforms such as Discrete Cosine Transform (DCT), Discrete Wavelet gained widespread popularity because it works adaptively in both spatial
and transform domain. It starts by extracting the statistical global features
of the cover image by estimating the pixel cost change function, before
selecting the locations for data hiding and then actual data embedding
process is carried out accordingly to achieve minimal distortion [19].
Therefore, it provides added layer of security to steganography. The
different techniques are discussed in detail in upcoming subsections.
Table 3 exhibits the relative comparison for some of the major
steganography schemes discussed in literature.
Structural Similarity SSIM is designed as a prototype of the SSIM index map often results in undesirable
approach(SSIM) image distortion as a combination of blockiness when calculated within the window.
The SSIM metric can assess Gaussian
three factors that are loss of correlation, This is overcome using Mean SSIM(MSSIM)
blur, additive Gaussian noise, jpeg and
luminance distortion and contrast evaluates the overall quality of the image by
jpeg 2000
distortion [29]. calculating the average of SSIM values over the
SSIM(x,y)=l(x,y)c(x,y)s(x,y) [30] entire windows
2𝑥+1 2𝑦+1
• Quantization Based Steganography: The embedding technique 𝐶(𝑢, 𝑣) = 𝛼(𝑢)𝛼(𝑣) ∑𝑁−1 𝑁−1
𝑥=0 ∑𝑦=0 𝑓(𝑥, 𝑦) 𝑐𝑜𝑠 [ ] × 𝑐𝑜𝑠 [ ] (25)
2𝑁 2𝑁
used in digital watermarking known as Quantization Index
Modulation(QIM) is extended to image steganography by quantizing √1
, 𝑓𝑜𝑟 𝑢 = 0
𝑁
an input signal x to y using a set of quantizers Qm(.). The choice of Where 𝐶(𝑢, 𝑣) = { }
√2
, 𝑓𝑜𝑟 𝑢 = 1,2, . . 𝑁 − 1
quantizer is depended on the secret message bit m. QIM [24] is 𝑁
Xin Liao, Kaide Li & Jiaojiao Embeds the encrypted data in the higher frequency of both real and It creates Complex matrix which often requires data
Yin, 2017 et al. [58] imaginary matrix is obtained by DFT coefficients division. The low recovery phase to obtain the image. The stego image has
frequency coefficients of matrix MR(MI) constitute a matrix MRL(MIL) PSNR = 37.98 dB. The recovered image after extracting of
with the size of ρn1 × n2, and then the high frequency coefficients additional data with PSNR = 45.75 dB
constitute matrix MRH(MIH) with the size of (1 − ρ)n1 × n2 where 0 < ρ
≤ 0.5. Encryption of message is done using the stream cipher algorithm.
Xiaolong Li, Bin Li, Bin The host image is divided into non-overlapping blocks such that each The PNSR <= 43.24 dB for an embedding rate=0.5B bpp,
Yang & Tieyong Zeng. 2013 block contains n pixels [60-61]. The n-dimensional histogram is the embedding capacity >= 59.37 DB for 10000 message
et al. [59] generated by counting the frequency of the pixel-value-array of each bits. The embedding method introduces capacity distortion
divided block to embed the secret data. Then the pixel-value-array is error which could be eliminated using optimized-shifting.
divided into two disjoint sets where one set is used to carry hidden data
by expansion embedding while the other set is simply shifted to create
vacant spaces to ensure the reversibility.
Chuan Qin, Chin-Chen EMD causes less embedding distortions and achieves greater embedding The stego image1 has PSNR =52.11 dB and image2 has
Chang & Tai-Jung Hsu, 2014 capacity than the LSB method. Data embedding is based on the prediction PSNR=41.62dB. Each pixel pair in one steganographic
et al. [62] errors to improve the performance. A cover image is chosen which image carries one secret digit in the quinary notation
produces two visually similar steganographic images post embedding. system. Hence, the total hiding capacity of the proposed
[63-65]. The first steganographic image shouldn’t be modified no more scheme is 608680 bits and the embedding rate is 1.16 bpp.
than one gray level (3/5th of pixels are not modified) based on the
modification direction of each stego pixel pair of the image, the
modification direction of each pixel pair in the second steganographic
image (13 twenty-fifths of the pixels are modified 1 and two-fifths of the
pixels in are modified by one, two, three, four, or five gray levels with the
equal probabilities) is adaptively modified which guarantee no
confusions in the image recovery procedure.
Jessica Fridrich & Jan The Multivariate Gaussian (MG) algorithm is content-adaptive which The embedding change probabilities aim to minimize KL
Kodovský, 2013 et al. [65] concentrates the embedding changes in edges and textures. The focus is to divergence between the cover and stego images. The
minimize the steganographic Fisher information to maximize the size of detection performance is evaluated using the minimal total
the secure payload that can be embedded at a fixed level of statistical error under equal prior probabilities and Lagrange
detectability using additive distortion. Syndrome Trellis Coding with multiplier is used to derive the optimal embedding change
LSB-M is used as the embedding algorithm. probabilities for a given payload and image. MG algorithm
offers better security than HUGO for payloads larger than
0.3 bpp.
Q Shen, G Liu, W Liu & Y Dai, Image block complexity is determined using linear texture and ROC curve is used as IQM metric. LibSVM is used for training
2015 et al. [66] blocks with larger texture complexity is selected depending on a and testing. It shows better resistance performance capability to
threshold. It employs pixel selection and syndrome-trellis codes typical SPAM steganalysis tool than EALSBMR and HUGO,
(STCs) to determine modification directions for embedding the without correction when tested by embedding with relative bpp
secret message using the modified distortion profile definition of payload of 0.05, 0.1 and 0.2. It was found that the method
HUGO algorithm. performs better in terms of detection rate and false alarm rate
Aref Miri & Karim Faez. 2017 et al. Data hiding in done in adaptive wavelet transform domain of a The cost function and performance metric is evaluated using MSE
[67] two dimensional linear frequency modulation (LFM) The mother and PSNR and PSPNR for computing surrounding variance and
wavelet matrix is used using genetic algorithm to match the secret ensures 80 dB for the stego image for different volume of payload
data with the cover image The inverse transform must be integer capacity.
numbers to guarantee image brightness in spatial domain.
Message is embedded by comparing the threshold value with the
average of the coefficients.
K. Muhammad, 2017 et al. [68] Security has been given utmost importance by encrypting the The stego image quality is evaluated using PSNR, NCC, RMSE,
stego key and secret data using a two-level encryption algorithm and SSIM. For payload of 2, 4, 6, and 8 KB, PSNR ranges from
(TLEA) and multi-level encryption algorithm (MLEA). The 61.7022 db to 55.9027 db
encrypted information is embedded in the host image using an
adaptive LSB substitution method that hides the encrypted
message in blue or green channel on the basis of red channel’s
LSB adaptively using the encrypted bits of secret key following
the scanning order of stego key
Soumendu Chakraborty, 2017 et al. An edge area in the cover image is predicted using Modified The computation complexity of the proposed method is O((m × n)
[69] Median Edge Detector (MMED) predictor to embed the payload, + S) for mxn grey scale image with S secret message, M. The
based on three levels of threshold which determines the number stego image has high MSE and PSNR= 53.84db for embedding
of bits to be embedded M=61,656 bits. It is robust against blind steganalysis evaluated
using Regular Singular (RS) and FLD (Fisher Linear
Discriminant) classifier.
Baby Della, 2015 et al. [71] DWT is used to decompose the cover image into 4 non- The average PSNR value is 55.53. The average MSE (Mean
overlapping sub-bands. At N stage, 3N+1 LL sub bands Square Error) value is around 5-10 for the stego image.
consisting of (LLX), (LHX), (HLX) and (HHX) are obtained by
employing Haar filters.
P.D Shah, 2018 et al. [73] and Steganography is modeled as a search and optimization problem ROC curve is used as IQM metric. LibSVM is used for training
Hamidreza Rashidy Kanan, 2014 et to find the best direction to embed. The starting point in host and testing. It offers better resistance performance capability to
al. [74] image for hiding secret is calculated using Genetic algorithm. The typical SPAM steganalysis tool than EALSBMR and HUGO
direction of pixel scanning has 16 possible states, genes of 4 bits without correction when tested by embedded with relative
length where the starting point is X-offset and Y-offset with 8 bits payload bpp of 0.05, 0.1 and 0.2 and and found that the method
length for each of them. Bit-Planes methods are utilized for performs better in terms of detection rate and false alarm rate
determining LSB planes in host pixels for embedding secret data
in host pixels. The genes are separated in two distinctive groups,
first group contains the genes that denote the embedding location,
and the second includes the genes manage adaptability more with
the host image by changing some values.
Tomas Denemark, 2017 et al. [75] It is based on MiPOD, the multivariate Gaussian model is The cost function and performance metric is evaluated using MSE
imposed on noise that estimates its parameters from the available and PSNR and PSPNR for computing surrounding variance and
precover or side information. The embedding rule is constrained ensures 80 dB for the stego image for different volume of payload
to a binary function. The Model based SI-MiPOD is designed to capacity
work for both RGB and JPEG domain. The average statistical
spread in terms of the standard deviation across ten image
databases is 0.0029 with 91% of all spreads falling in the range
0.0010–0.0040
Jiang, 2017et al. [77] The cover image is processed using quantum image processing (QIP) to give The stego image quality is evaluated using PSNR, NCC,
the representation of quantum images, followed by image scrambling to RMSE, and SSIM. For payload of 2, 4, 6, and 8 KB,
transform the cover image into a disordered image by permutations of the PSNR ranges from 61.7022 db to 55.9027 db
pixels into new positions. The 2n CNOT gates are used to test the embedding
position information of I and M representation of quantum representation
(NEQR). Two blind steganography schemes is developed by embedding using
simple LSB in which the message bits substitute for the pixels LSB directly.
Another scheme uses block LSB which embeds a message bit into a number of
pixels that belong to one image block. The message is regained using
extracting circuits only according to the stego cover.
Vahid Sedighi, 2015 et al. The cover pixels probabilities are changed by a certain amount derived from The computation complexity of the proposed method is
[9] and Yuan Bian, 2017 et the cover model to minimize the power of optimal statistical test. This model O((m × n) + S) for mxn grey scale image with S secret
al. [37] driven approach improves the empirical security by allowing the embedding message.
changes in highly textured areas to have larger amplitude to embed larger IQM for stego is PSNR, MSE. High PSNR of 53.84db
payload. The sender first estimates the cover model parameters, the pixel for modification of 61,656 bits. It is robust against blind
variances and models the pixels as a sequence of independent non-identically steganalysis evaluated using Regular Singular (RS) and
distributed generalized Gaussian random variables. Embedding is done using FLD(Fisher Linear Discriminant) classifier
syndrome-trellis codes and pentary embedding, computed by solving a pair of
non-linear algebraic equations.
Bin Li, 2015 et al. [44] The cover image is decomposed into several sub-images, in which message The average PSNR value is 55.53. The average MSE
segments are embedding in local textured regions with well-known schemes (Mean Square Error) value is around 5-10 for the stego
using additive distortion functions by clustering the locations of embedding image.
modifications and directions of embedding modifications. The bias of a pixel
cost is updated based on change of neighboring pixels direction
(positive/negative). Ternary Embedding (±1) is used.
Guo, 2012 et al. [78] Designs an additive distortion metric for JPEG steganography. Embedding is For a secret image of 256x256 embedded in a stego
done uniformly using Syndrome Trellis Coding by modifying nonzero image of 512x512, the average PNSR is 45.13. The
quantized DCT coefficients. Uniformity is made possible by using uniform genetic algorithm parameters used are Population size of
embedding distortion metric (UED) which is based on the magnitude of the 300, Crossover rate =0.7 Mutation rate= 0.04
DCT coefficients and the intra- and inter-block neighbouring coefficients. Replacement rate=0.8. The average embedding capacity
for 0.5 bpp to 3.95 bpp is in the range of 54.25 to 35.42.
References
[1] Kharrazi, Mehdi, Husrev T. Sencar & Nasir Memon. (2007). Image Heidelberg.
Steganography and Steganalysis: Concepts and Practice. Lecture [5] D. Ker. (2009). The Square Root Law requires a linear key.
Notes Series Institute for Mathematical Sciences, National Proceedings of 11th ACM Workshop on Multimedia and
University of Singapore. Security, New Jersey, USA.
[2] C. Vanmathi & S. Prabu. (2018). Image Steganography using [6] Bui Cong Nguyen, Sang Moon Yoon & Heung-Kyu Lee. (2006).
Fuzzy Logic and Chaotic for Large Payload and High Multi Bit Plane Image Steganography. Springer Conference on
Imperceptibility. Springer International Journal of Fuzzy Digital Watermarking (IWDW), Lecture Notes in Computer
Systems, Berlin, Heidelberg. Science, Berlin, Heidelberg.
[3] A. Cheddad, J. Condell, K. Curran & P.M. Kevitt. (2010). Digital [7] Kim-Han Thung & Paramesran Raveendran. (2009). A survey of
image steganography: survey and analysis of current methods, image quality measures. IEEE International Conference for
Elsevier Journal on Signal Processing, 727–752, Northern Ireland, Technical Postgraduates (TECHPOS), Kuala Lumpur, Malaysia.
UK. [8] Linjie Guo, Jiangqun Ni & Yun Qing Shi. (2014). Uniform
[4] C. Cachin. (1998). An information-theoretic model for Embedding for Efficient JPEG Steganography. IEEE Transactions
steganography. Aucsmith D. (eds) Information Hiding, Springer, on Information Forensics and Security, 814-825.
Lecture Notes in Computer Science, 1525, 306–318, Verlag, [9] Vahid Sedighi, Jessica Fridrich, Remi Cogranne. (2015). Content-