Image Steganography Technique by Using MSUSAN Algorithm
Keywords:hiding image, LSB Method, secret image, cover image, steganography and SUSAN
AbstractNowadays, the protection of secret data, which is being sent during transmission channel, has become one of the most important challenges in the information security. Therefore, the using of multimedia technology to provide data protection is needed. Hence, one of the most common data security methods used is image steganography. This paper applied “Modified Smallest Univalue Segment Assimilating Nucleus” (MSUSAN) algorithm to detect the interest points, which it are used to steganography, so that the embedding process in the area containing the edges or corners is less susceptible to discovery because the human eye is not sensitive to the change of edges. So when the nucleus is a candidate corner, the block detected as a rough block. Whereas the nucleus isn’t a candidate corner, the block detected as smooth block. The least significant bit (“LSB”) technique is used to hide 3 bits in the rough block while 2 bits are hidden in the smooth block. Therefore, this method is of high efficiency in terms of payload rate, “Peak Signal Noise Ratio”(PSNR) and “Mean Square Error”( MSE) which gives average PSNR of 54.25 and average MSE of 0.25 when hiding secret.image of_size “128*128” (131,072 bits) in different cover image of size 512*512.In spite of hiding the largest number of secret bits up to 546506 bits, which is approximately secret image of size 261 * 261 , the PSNR is still above 46 and the MSE is still less than 1.4 . This shows that the quality of the proposed technique in this paper is very good
H. E. Prabowo and T. Ahmad, “Enhancement Of Pixel Value Ordering Based Data Hiding By Row Block Partition,” J. Ilmu Komput. dan Inf., vol. 11, no. 2, pp. 77–85, 2018.
H. E. Prabowo and T. Ahmad, “Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer Networks.,” JCM, vol. 13, no. 6, pp. 325–332, 2018.
W. Hong and T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” Journal of Visual Communication and Image Representation, vol. 22, no. 2. pp. 131–140, 2011.
X. Li, J. Li, B. Li, and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, vol. 93, no. 1. pp. 198–205, 2013.
F. Peng, X. Li, and B. Yang, “Improved PVO-based reversible data hiding,” Digit. Signal Process., vol. 25, pp. 255–265, 2014.
P. Maniriho and T. Ahmad, “Enhancing the Capability of Data Hiding Method Based on Reduced Difference Expansion,” Eng. Lett., vol. 26, no. 1, pp. 45–55, 2018.
J. Bai, C. C. Chang, T. S. Nguyen, C. Zhu, and Y. Liu, “A high payload steganographic algorithm based on edge detection,” Displays, vol. 46. pp. 42–51, 2017.
M. Cem kasapbaşi and W. Elmasry, “New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check,” Sadhana - Academy Proceedings in Engineering Sciences, vol. 43, no. 5. 2018.
S.-Y. Shen and L.-H. Huang, “A data hiding scheme using pixel value differencing and improving exploiting modification directions,” Comput. Secur., vol. 48, pp. 131–141, 2015.
M. H. Shokhan and A. M. Khitam, “Biometric identification system by lip shape,” Int. J. Adv. Comput. Res., vol. 5, no. 18, p. 19, 2015.
H. Al-Dmour and A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding,” Expert Syst. Appl., vol. 46, pp. 293–306, 2016.
S. Shen, L. Huang, and S. Yu, “A novel adaptive data hiding based on improved EMD and interpolation,” Multimed. Tools Appl., vol. 77, no. 10, pp. 12563–12579, 2018.
K. Gaurav and U. Ghanekar, “Image steganography based on Canny edge detection, dilation operator and hybrid coding,” Journal of Information Security and Applications, vol. 41. pp. 41–51, 2018.
D. Tulpan, N. Belacel, F. Famili, and K. Ellis, “Experimental evaluation of four feature detection methods for close range and distant airborne targets for Unmanned Aircraft Systems applications,” 2014 International Conference on Unmanned Aircraft Systems, ICUAS 2014 - Conference Proceedings. pp. 1267–1273, 2014.
H. Y. et al. Jin, Lee; Ong, Say Leong; Ng, “Jin 2013.Pdf,” Journal of Membrane Science journal, vol. 427. pp. 250–258, 2013.
P. Dahal, D. Peng, Y. Yang, and H. Sharif, “A resource-efficient approach to steganography in mobile systems,” 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. pp. 150–157, 2016.
M. Dixit and S. Silakari, “A Hybrid Approach of Face Recognition Using Bezier Curve,” Int. J. Adv. Sci. Technol., vol. 71, pp. 41–48, 2014.
S. T. Pathan, S. S. Waghmare, P. P. Khadse, P. P. Shukla, and S. A. Wawre, “A survey paper on a novel approach for image classification based on susan low level image processing algorithm from real time video,” Int. J. Sci. Technol. Res., vol. 3, no. 2, pp. 201–205, 2014.
Y. Inan, “Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB,” in ITM Web of Conferences, 2018, vol. 22, p. 1026.
S. Chakraborty, A. S. Jalal, and C. Bhatnagar, “LSB based non blind predictive edge adaptive image steganography,” Multimed. Tools Appl., vol. 76, no. 6, pp. 7973–7987, 2017.