294x Filetype PDF File size 1.17 MB Source: romisatriawahono.net
COMPUTER SCIENCE REVIEW ( ) –
Available online at www.sciencedirect.com
ScienceDirect
journal homepage: www.elsevier.com/locate/cosrev
Current status and key issues in image
steganography: A survey
Mansi S. Subhedara,∗, Vijay H. Mankarb
aResearch Scholar, Department of Electronics & Telecommunication, Bapurao Deshmukh College of Engineering,
Sevagram, Wardha, 442102, Maharashtra, India
bDepartment of Electronics & Telecommunication, Government Polytechnic, Nagpur, 440001, Maharashtra, India
A R T I C L E I N F O A B S T R A C T
Article history: Steganography and steganalysis are the prominent research fields in information hiding
Received 5 October 2013 paradigm. Steganography is the science of invisible communication while steganalysis
Accepted11September2014 is the detection of steganography. Steganography means “covered writing” that hides
the existence of the message itself. Digital steganography provides potential for private
Keywords: and secure communication that has become the necessity of most of the applications
Information hiding in today’s world. Various multimedia carriers such as audio, text, video, image can act
Imagesteganography as cover media to carry secret information. In this paper, we have focused only on
Steganalysis image steganography. This article provides a review of fundamental concepts, evaluation
Imagequalitymeasures measures and security aspects of steganography system, various spatial and transform
domain embedding schemes. In addition, image quality metrics that can be used for
evaluationofstegoimagesandcoverselectionmeasuresthatprovideadditionalsecurityto
embeddingschemearealsohighlighted.Currentresearchtrendsanddirectionstoimprove
onexisting methodsaresuggested.
c
⃝2014ElsevierInc.Allrights reserved.
1. Introduction Steganography and cryptography are closely related con-
cepts. Though both the terms share a common goal, the
The word steganography is obtained from the Greek words way and the usage of both differ significantly. Steganogra-
“stegos” means “cover” and “grafia” means “writing”, defin- phyishiddenwritingwhereascryptographyissecretwriting
ing it as “covered writing”. Usually secure communication i.e. cryptography provides security with respect to content of
is achieved by the method of encryption. But nowadays, de- the message whereas steganography will hide the existence
mand for security is increasing day by day that leads to the of the message itself. Digital watermarking is another branch
use of steganography for information security. The idea of of information hiding. Both steganography and watermark-
data hiding or steganography was first introduced with the ing are the methods of data embedding, but there are sev-
example of prisoner’s secret message by Simmons in 1983 eral differences among them. A detailed comparison can be
[1–3]. Fig. 1 shows various disciplines of information hiding. found in [4–7]. A variety of multimedia carriers that includes
∗Corresponding author. Tel.: +91 9867967304.
E-mail addresses: mansi_subhedar@rediffmail.com, msubhedar@mes.ac.in (M.S. Subhedar), vhmankar@gmail.com (V.H. Mankar).
http://dx.doi.org/10.1016/j.cosrev.2014.09.001
c
1574-0137/⃝2014Elsevier Inc. All rights reserved.
2 COMPUTER SCIENCE REVIEW ( ) –
Security Systems
Information Hiding
Cryptography Steganography Watermarking
Linguistic Technical Robust Fragile
Steganography Steganography
Imperceptible Visible Fingerprint
Digital Images Video Audio Text
Fig. 1 – Disciplines of information hiding [4].
text, audio, video, imagecanbeusedforsteganography.Some Security means eavesdropper’s inability to detect hidden
of the ways to achieve text steganography involve modifica- information. Perceptual transparency ensures the retention of
tion of text layout, use of nth character from text or alteration the visual quality of the cover after data embedding. Tamper
of some of the rules such as spaces etc. Another approach resistance means to remain intact in the face of malicious at-
includes usage of a code consisting of combination of char- tacks. The embedding rate is measured as the number of em-
acter, line and page numbers. However, this technique lacks beddedbitspercarrier bit. The embedding efficiency is given by
in security. Hiding information in audio files can be done by the expected number of embedded message bits per modi-
using frequencies that are inaudible to human ear. Similarly, fied carrier bit. The change rate gives the average percentage
video files can also be thought of to embed secret informa- of modified carrier bits.
tion. Since it is a moving stream of images and sounds, any
minordistortions may be unseen because of continuous flow 1.2. General model of steganography
of information. The advantage in this case will be high pay-
load capacity. Image is the most popular file format used for The concept of steganography is usually modeled by pris-
steganography as they possesses high degree of redundancy. oner’s problem. Fig. 2 exhibits the overall structure for the
With image steganography, better imperceptibility and pay- steganography system. Let ‘C’ denotes the cover medium
′
loadcapacitycanbeachieved.Steganalysisisanartofdetect- i.e. image A and C be the stego image obtained by data em-
ing covert communication [8]. In this paper, we focus only on bedding.Let‘K’representsanoptionalkeyand‘M’isthemes-
imagesteganographywithlittlemoreemphasisontransform sage we want to communicate. E suggests the embedding
m
domainsteganography. process and Ex is for the process of extraction. Compression
and encryption eliminate the redundancy in secret message
1.1. Fundamental concepts and result in enhanced security. Thus, data embedding pro-
cess can be represented as follows:
Cover image refers to the image used for carrying the embed- ′
E :C⊕K⊕M→C
ded bits, embedded data is known as payload and the image m
E E c,k,m ≈m, ∀c∈C,k∈K,m∈M. (1)
withembeddeddataiscalledasstegoimage.Steganalysisrefers x m
totheattackonsteganography.Thedistortioninducedonthe Imageisthemostoftenusedfileformatforsteganography
hostsignalbythedataembeddingprocessiscalledtheembed- and is only discussed here where the secret message
ding distortion. is embedded in cover image. Applications of steganography
Imperceptibility is innocuousness of the stego image. Stego include copyright control of materials, enhancing robustness
image should not have severe visual artifacts. Some of the of image search engines and smart id’s, feature tagging,
major requirements of steganography include capacity, ro- secret communication, video-audio synchronization, TV
bustness and security. Robustness indicates the amount of broadcasting, TCP/IP packets etc. [10,11]. Image quality
modification that the stego medium can withstand before measures are used for the evaluation of stego image
an adversary can destroy hidden information. Capacity refers quality obtained after embedding. Different methods exist
to the amount of information that can be hidden in cover for attacking the steganographic algorithm. The number of
medium without deteriorating the integrity of the cover im- steganography tools are available that includes Ezstego, F5,
age. It is represented in terms of bits per pixel (bpp). Embed- Hide and Seek, Hide4PGP, Mp3Stego, OutGuess, StegHide,
ding operation needs to preserve the statistical properties of Stegnos, S-tools etc. Various forms of steganalysis include
the cover image in addition to the perceptual quality. identifying the existence of secret message and finding its
COMPUTER SCIENCE REVIEW ( ) – 3
Fig. 2 – General model of steganography [9].
approximate length or even trying to retrieve it. Various medium is wrongly classified as cover, TN (True
stego attacks include image resizing attack, image tampering Negative): a cover medium is correctly classified as
attack, AWGN attack, JPEG compression attack, RS attack, cover, FP (False Positive): a cover medium is wrongly
filter attack, chi square attack, J. Fridrich’s RS steganalysis, classified as stego.
Jeremiah J. Harmsena’s Histogram attack etc. The algorithm Payload capacity: It is defined in terms of number of secret
used for data embedding should withstand against all these bitsthatcanbeembeddedperpixel.Ideallyitshould
types of attacks making eavesdropper unable to retain the beashighaspossiblewhilemaintainingtheaccept-
hiddenmessage. able quality of the stego image. It is also known as
Survey reports presented till now [7,10–12] explored var- hiding capacity or embedding capacity and is mea-
ious fundamental issues in steganography, spatial domain sured in terms of bits per pixel or bits per trans-
andtransformdomainapproachesfordatahiding,steganaly- form coefficient (for spatial and transform domain
sis techniques etc. However, there are many unattended ar- approachrespectively).
eas that considerably influence image steganography. This Imperceptibility: Steganography system should have high
paper focuses mainly on such areas e.g. security aspects of embedding capacity and capability to withstand
steganography system, cover selection measures and IQM against stego attacks. The stego image should not
analysis. haveseverevisualartifacts.Higherthefidelityofthe
The outline of the paper is as follows: Section 2 discusses stego image, the better.
performance evaluation measures and security aspects. Sec-
tion 3 presents overview of various image steganography 2.1. Steganographic security
techniques. Image quality measures and cover selection cri-
teria are illustrated in Sections 4 and 5 respectively. Section 6 Securityisalwaystheimportantcriterionwhiledesigningany
concludes the paper. application. There are numerous ways to define security of
steganography system e.g.
2. Performance evaluation measures Maximummeandiscrepancy(MMD)security: Withadvances
in steganography algorithms and methods to detect
In literature, many steganography schemes are presented them, issue of comparing them with a fair bench-
basedonvarietyofparameters.Someofthemworkinspatial mark is a critical task. The task of identifying the
domain and other in transform domain. Irrespective of the differences between cover and stego image is a two
approachusedfordataembedding,somecommonattributes sample problem that can be solved using MMD. It
need to be defined to achieve uniqueness in performance findsthediscrepancybetweenpdfofcoverandstego
rating. Some of them can be defined as follow: objects. It is given by,
MMD F,X,Y
Security against attack: The steganographic system may ( )
suffer from different types of stego attacks, allow- D D
,sup 1 f(x)− 1 f(y) (3)
ingeavesdroppertoretrievesecretmessagebitsem- D i D i
bedded in cover media. The system is said to be γ— f∈F i=1 i=1
secure if TP Rate − FP Rate ≤ γ, where 0 ≤ γ ≤ 1. And where X = x1,x2,...,xD and Y = y1,y2,...,yD are
is said to be perfectly secure if γ = 0. thesamplesfromprobabilitydistributionsPx andPy
respectively. f is a class of function which is built
TP FP
TPRate= S , FP Rate = S (2) fromsymmetric,positivedefinite function.
TP +FN TN +FP
S S S S Advantages of MMD include numerical stability,
where, TP (True positive): a stego medium is cor- well scaled with data dimensionality and converge
1
rectly classified as stego, FN (False Negative): a stego independently on data dimension d with error √ ,
D
4 COMPUTER SCIENCE REVIEW ( ) –
Fig. 3 – (a) Confusion matrix (b) ROC curve.
whereDisthenumberofsamples[13].Also,MMD’s vergence which justifies the security. The bigger the
2 correlation parameter ρ, KL divergence is larger.
computational complexity is O D , that is faster
thansupportvectormachines(SVM).
ROCbasedsecurity: Anotherwaytoquantifysecurityiswith
reference to ROC. As shown in Fig. 3, it is the plot 3. Imagesteganography
of false positive rate versus true positive rate [6,14].
The true positive rate is plotted on Y axis and false Imagesteganographycanbebroadlyclassifiedintospatialdo-
positive rate on X axis. Larger the area under the main, transform domain, spread spectrum and model based
curve, better the performance of the steganalytic steganography as depicted in Fig. 4. In spatial domain, se-
system e.g. performance of curve C is better than B, cret message is embedded in pixel value directly whereas
andthatofBisbetterthanA.Eq.(2)describesoneof transformdomainmethodsachieveembeddingbyfirsttrans-
the conditions to be satisfied for the secure system. forming the image from spatial to frequency domain using
Correlation coefficient: The correlation coefficient between any one of the transforms such as discrete cosine transform
twoadjacentelementsC andC is ρ andthecorre- (DCT), discrete wavelet transform (DWT), Hadamard trans-
i i+1
lation coefficient between two arbitrary elements C form, Dual tree DWT, double density dual tree DWT (DD DT
i
andCj isρ|j−i|. The bigger the ρ, the stronger the cor- DWT), ridgelet transform, curvelet transform etc. and then
relation. Security will be improved if selected cover embeddingisdoneinsuitabletransformcoefficients.
image is with smaller ρ [15–17]. In statistics, Bhat- This section deals in detail with each of these methods.
tacharya distance measures the similarity between Various techniques can be employed to optimally choose the
two discrete or continuous probability distributions transform coefficients to hide data in. Soft computing tools
and is denoted by DB(Pc,Ps). Smaller the ρ, smaller can be considered for this purpose. As transform domain
the DB(P ,P ) when ρ ∈ [0,1]. BD between P and P
c s c s methods are more immune to image processing operations
is defined as, and are less susceptible to stego attacks, they are usually
1 det(R) preferred over spatial domain methods.
BD P ,P = ln (4) Spread spectrum steganography involves embedding in
( c s) 2 det(R ) det(R )
c s noise inherent to image acquisition process. Image restora-
where Pc is probability distribution of cover im- tion and error control techniques can be used while extract-
age, Rc is covariance matrix, σ2 is the variance of ing the data at the decoder side. It is a blind scheme as
c
marginal distribution and ρ is the parameter repre- original image is not required while extraction. This method
senting the degree of cover data dependency. outperforms in terms of payload capacity and invisibility.
Kullback–Leibler (K–L) divergence: KL divergence is also one Model based steganography is based on statistical model of
of popular security measures to analyze the the cover image. It is also known as statistics aware embed-
steganography system. It has been proposed by ding. Before selecting the locations for data hiding in cover
Cachin in 1998 [17]. Let X and Y represent cover and image, statistical global features of image are taken into ac-
stego image and p and q denote the probability count and then actual data embedding process is carried out
x y
distribution function of X and Y respectively. KL di- accordingly. Thus, it provides additional layer of security to
vergence between two probability distribution func- steganography. All these methods are discussed in detail in
tions is given by, forthcoming subsections.
p (g)
D p ∥q = p (g)log x (5) 3.1. Spatial domain steganography
x y x q (g)
g∈G y
where g ∈ G = {0,1,2,...,255} is the pixel value in In this method, the pixel value is directly modified for data
gray scale images. The embedding algorithm should hiding. The various approaches to achieve embedding in
be designed so as to get minimum value of KL di- spatial domain are shown in the Fig. 5.
no reviews yet
Please Login to review.