Hiding in encrypted images: a three tier security data hiding technique

被引:15
作者
Parah, Shabir A. [1 ]
Sheikh, Javaid A. [1 ]
Assad, Umer I. [2 ]
Bhat, Ghulam M. [1 ]
机构
[1] Univ Kashmir, Post Grad Dept Elect & Instrumentat Technol, Srinagar 190006, Jammu & Kashmir, India
[2] JK Bank, Business Div Kashmir, Srinagar 193504, Jammu & Kashmir, India
关键词
Data hiding; Scrambling; Watermarking; Intermediate significant bit plane; Tamper detection; LSB SUBSTITUTION; STEGANALYSIS;
D O I
10.1007/s11045-015-0358-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new crypto domain data hiding technique based on Intermediate Significant Bit Plane Embedding (ISBPE). The cover image is encrypted; the information to be secured is scrambled, and then embedded in the Intermediate Significant Bit (ISB) planes of encrypted cover image, at the locations determined by a Pseudorandom Address Vector (PAV). The pseudorandom embedding of the scrambled data in the ISB planes of encrypted image results in a three tier security of the data to be secured. The ISBPE embedding results in an important advantage that the proposed scheme becomes completely robust to commonly employed attack of Least Significant Bit (LSB) removal/replacement. A novel concept of embedding a very small size fragile watermark in addition to the secret information has been used which facilitates early tamper detection. This feature could save crucial processor time in critical situations of national security issues/warfare etc. Experimental results show that the proposed scheme is more robust to various signal processing attacks like Joint Picture Expert Group compression, Additive White Gaussian Noise and 'salt and pepper' noise as compared to conventional LSB based embedding techniques. Comparison results with some well-known techniques show that besides providing high degree of security and robustness to various malicious attacks the proposed technique is capable of embedding a fairly large amount of secret data in the host image while maintaining a good stego-image quality.
引用
收藏
页码:549 / 572
页数:24
相关论文
共 24 条
[1]  
Abdulmahdi N. H., 2010, PROCEDIA ENG, V53, P463
[2]  
[Anonymous], 2012, INT C EM TRENDS SCI, DOI DOI 10.1109/INCOSET.2012.6513904
[3]   Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications [J].
Azarderakhsh, Reza ;
Jarvinen, Kimmo U. ;
Mozaffari-Kermani, Mehran .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (04) :1144-1155
[4]  
Bhat GM, 2010, MAEJO INT J SCI TECH, V4, P125
[5]   A framework for avoiding steganography usage over HTTP [J].
Blasco, Jorge ;
Cesar Hernandez-Castro, Julio ;
Maria de Fuentes, Jose ;
Ramos, Benjamin .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) :491-501
[6]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[7]   High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding [J].
Chang, I-Cheng ;
Hu, Yu-Chen ;
Chen, Wu-Lin ;
Lo, Chun-Chi .
SIGNAL PROCESSING, 2015, 108 :376-388
[8]   Higher-order statistical steganalysis of palette images [J].
Fridrich, J ;
Miroslav, G ;
Soukal, D .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :178-190
[9]   A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding [J].
Gui, Xinlu ;
Li, Xiaolong ;
Yang, Bin .
SIGNAL PROCESSING, 2014, 98 :370-380
[10]   Universal data embedding in encrypted domain [J].
Karim, Mustafa S. Abdul ;
Wong, KokSheik .
SIGNAL PROCESSING, 2014, 94 :174-182