Local Binary Pattern Based Robust Coverless Information Hiding Approach

被引:0
作者
Sangeeta Gautam [1 ]
Manoj Kumar [1 ]
机构
[1] Department of Computer Science, Babasaheb Bhimrao Ambedkar University (A Central University), Vidya Vihar, Raebareli Road, U.P., Lucknow
关键词
Coverless information hiding; Hiding capacity; Local binary pattern; Paillier cryptosystem; Robustness; Security;
D O I
10.1007/s42979-024-03559-w
中图分类号
学科分类号
摘要
To address the drawbacks of existing secret data hiding techniques, such as their high computational demands for training deep neural networks or their limited hiding capacity, we present a new approach. Our proposed approach utilizes Local Binary Pattern codes to generate hash sequences for concealing secret data, offering a more efficient solution. These hash sequences are used to encode the secret information within the cover images. To enhance security, we encrypt the mapping file using a Paillier cryptosystem. The recipient can successfully extract the secret information once the mapping file is decrypted and reverse the hash sequence generation algorithm is applied. The effectiveness of the method is demonstrated through extensive experimentation and comparison with the existing approaches. Results indicate that the proposed method not only reduces the computational cost but also outperforms traditional methods in terms of security and robustness. Our method reports approximately 95% accuracy in data recovery after common image processing attacks, such as scaling, noise addition, and image filtering, and allows to hide 72 bits of secret data per image. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2024.
引用
收藏
相关论文
共 46 条
  • [1] Petitcolas F.A., Anderson R.J., Kuhn M.G., Information hiding-a survey, Proc IEEE, 87, 7, pp. 1062-1078, (1999)
  • [2] Cox I., Digital watermarking and steganography, Morgan Kaufmann Google Scholar, 2, pp. 893-914, (2007)
  • [3] Morkel T., Eloff J.H., Olivier M.S., An overview of image steganography, 1, pp. 1-11, (2005)
  • [4] Chandramouli R., Memon N., Analysis of LSB based image steganography techniques, Proceedings 2001 International Conference on Image Processing (Cat. No. 01CH37205), 3, pp. 1019-1022, (2001)
  • [5] Pan F., Li J., Yang X., Image steganography method based on PVD and modulus function, International Conference on Electronics, Communications and Control (ICECC). IEEE, 2011, pp. 282-284, (2011)
  • [6] Liu C.L., Liu H.H., Reliable detection of histogram shift-based steganography using payload invariant features, Appl Mech Mater, 284, pp. 3517-3521, (2013)
  • [7] Chang C.-C., Huang Y.-H., Lu T.-C., A difference expansion based reversible information hiding scheme with high stego image visual quality, Multimedia Tools Appl, 76, pp. 12659-12681, (2017)
  • [8] Soni A., Jain J., Roshan R., Image steganography using discrete fractional Fourier transform, In: 2013 International Conference on Intelligent Systems and Signal Processing (ISSP). IEEE, pp. 97-100, (2013)
  • [9] Hashad A.I., Madani A.S., Wahdan AEMA. A robust steganography technique using discrete cosine transform insertion, . In: 2005 International Conference on Information and Communication Technology. IEEE, pp. 255-264, (2005)
  • [10] Oudah M.K., Abed A.N., Khudhair R.S., Kaleefah S.M., Improvement of image steganography using discrete wavelet transform, Eng Technol J, 38, 1A, pp. 83-87, (2020)