CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method

被引:91
作者
Muhammad, Khan [1 ,2 ]
Ahmad, Jamil [1 ,2 ]
Rehman, Naeem Ur [2 ]
Jan, Zahoor [2 ]
Sajjad, Muhammad [2 ]
机构
[1] Sejong Univ, Digital Contents Res Inst, Seoul, South Korea
[2] Islamia Coll Peshawar, Dept Comp Sci, Peshawar, Pakistan
关键词
Image steganography; Information security; Image quality; LSB; Stego key; Multimedia security; Data hiding; ENCRYPTION ALGORITHM; SUPERRESOLUTION; SCHEME;
D O I
10.1007/s11042-016-3383-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information hiding is an active area of research where secret information is embedded in innocent-looking carriers such as images and videos for hiding its existence while maintaining their visual quality. Researchers have presented various image steganographic techniques since the last decade, focusing on payload and image quality. However, there is a trade-off between these two metrics and keeping a better balance between them is still a challenging issue. In addition, the existing methods fail to achieve better security due to direct embedding of secret data inside images without encryption consideration, making data extraction relatively easy for adversaries. Therefore, in this work, we propose a secure image steganographic framework based on stego key-directed adaptive least significant bit (SKA-LSB) substitution method and multi-level cryptography. In the proposed scheme, stego key is encrypted using a two-level encryption algorithm (TLEA); secret data is encrypted using a multi-level encryption algorithm (MLEA), and the encrypted information is then embedded in the host image using an adaptive LSB substitution method, depending on secret key, red channel, MLEA, and sensitive contents. The quantitative and qualitative experimental results indicate that the proposed framework maintains a better balance between image quality and security, achieving a reasonable payload with relatively less computational complexity, which confirms its effectiveness compared to other state-of-the-art techniques.
引用
收藏
页码:8597 / 8626
页数:30
相关论文
共 53 条
  • [1] [Anonymous], 2015, MULTIMEDIA TOOLS APP
  • [2] [Anonymous], INT J COMPUT INFORM
  • [3] [Anonymous], 2009, TENCON 2009 2009 IEE, DOI DOI 10.1109/ICIECS.2009.5364290
  • [4] A cycling chaos-based cryptic-free algorithm for image steganography
    Aziz, Mahdi
    Tayarani-N, Mohammad H.
    Afsar, Mehdi
    [J]. NONLINEAR DYNAMICS, 2015, 80 (03) : 1271 - 1290
  • [5] Bailey K, 2006, MULTIMED TOOLS APPL, V30, P55, DOI 10.1007/s11042-006-0008-4
  • [6] Root mean square error (RMSE) or mean absolute error (MAE)? - Arguments against avoiding RMSE in the literature
    Chai, T.
    Draxler, R. R.
    [J]. GEOSCIENTIFIC MODEL DEVELOPMENT, 2014, 7 (03) : 1247 - 1250
  • [7] Cheddad A, 2014, ENCRYPTION METHOD
  • [8] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [9] Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
  • [10] High payload steganography mechanism using hybrid edge detector
    Chen, Wen-Jan
    Chang, Chin-Chen
    Le, T. Hoang Ngan
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (04) : 3292 - 3301