Transactions on Machine Intelligence

Transactions on Machine Intelligence

A Method to Hide Information in Image Based on Selected Pixels

Document Type : Original Article

Author
Department of Computer, Payame Noor University, PO BOX 19395-3697, Tehran, Iran
Abstract
There are various methods for concealing information or transmitting it covertly, with steganography being a prominent approach for secret communication. Unlike watermarking and fingerprinting, steganography aims to hide information in a way that its presence remains undetectable. Steganography is commonly applied to electronic media, particularly audio and image files. This paper provides an overview of image steganography, its applications, and different techniques. The objective is to outline the key features of an effective steganography algorithm. The ultimate goal is to develop a cross-platform solution capable of concealing a message within a digital image file. An image comprises numerous pixels, each with three color values, and is composed of millions of such numbers. Modifying a few color values in specific pixels typically results in an image that closely resembles the original. This paper introduces a technique that involves altering selected pixel color values based on the intensity criteria of colors in the image. The method strives to minimize image quality degradation, maintain information security, and, whenever possible, avoid changes in the image size.
Keywords

  • Kaur, S., Bansal, S., & Bansal, R. K. (2014). Steganography and classification of image steganography techniques. In Proceedings of the 2014 International Conference on Computing for Sustainable Global Development (INDIACom). https://doi.org/10.1109/IndiaCom.2014.6828087
  • Baawi, S. S., Mokhtar, M. R., & Sulaiman, R. (2018). A comparative study on the advancement of text steganography techniques in digital media. ARPN Journal of Engineering and Applied Sciences, 13, 1854-1863.
  • Bhatt, S., Ray, A., Ghosh, A., & Ray, A. (2015). Image steganography and visible watermarking using LSB extraction technique. In Proceedings of the 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO). https://doi.org/10.1109/ISCO.2015.7282315
  • Bucerzan, D., & Raţiu, C. (2016). Testing methods for the efficiency of modern steganography solutions for mobile platforms. In Proceedings of the 2016 6th International Conference on Computers Communications and Control (ICCCC). https://doi.org/10.1109/ICCCC.2016.7496734
  • Chakraborty, S., Jalal, A. S., & Bhatnagar, C. (2017). LSB based non blind predictive edge adaptive image steganography. Multimedia Tools and Applications, 76(6), 7973-7987. https://doi.org/10.1007/s11042-016-3449-4
  • Cui, W., Liu, S., Jiang, F., Liu, Y., & Zhao, D. (2020). Multi-stage residual hiding for image-into-audio steganography. In Proceedings of the ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). https://doi.org/10.1109/ICASSP40776.2020.9054033
  • Dalal, M., & Juneja, M. (2018). Video steganography techniques in spatial domain: A survey. In Proceedings of the International Conference on Computing and Communication Systems. https://doi.org/10.1007/978-981-10-6890-4_67
  • Chandramouli, R., Kharrazi, M., & Memon, N. (2003). Image steganography and steganalysis: Concepts and practice. In Proceedings of the International Workshop on Digital Watermarking. https://doi.org/10.1007/978-3-540-24624-4_3
  • Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E., & Mohamed, E. (2018). A secure image steganography algorithm based on least significant bit and integer wavelet transform. Journal of Systems Engineering and Electronics, 29(3), 639-649. https://doi.org/10.21629/JSEE.2018.03.21
  • Duan, X., Guo, D., Liu, N., Li, B., Gou, M., & Qin, C. (2020). A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access, 8, 25777-25788. https://doi.org/10.1109/ACCESS.2020.2971528
  • Joshi, K., Gill, S., & Yadav, R. (2018). A new method of image steganography using 7th bit of a pixel as an indicator by introducing the successive temporary pixel in the grayscale image. Journal of Computer Networks and Communications. https://doi.org/10.1155/2018/9475142
  • Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335, 299-312. https://doi.org/10.1016/j.neucom.2018.06.075
  • Khan, S., Irfan, M. A., Arif, A., Ali, A., Memon, Z. A., & Khaliq, A. (2020). Reversible-enhanced stego block chaining image steganography: A highly efficient data hiding technique. Canadian Journal of Electrical and Computer Engineering, 43(2), 66-72. https://doi.org/10.1109/CJECE.2019.2938844
  • Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2019). Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73-80. https://doi.org/10.1109/TSMC.2019.2903785
  • Liu, J., Ke, Y., Zhang, Z., Lei, Y., Li, J., Zhang, M., & Yang, X. (2020). Recent advances of image steganography with generative adversarial networks. IEEE Access, 8, 60575-60597. https://doi.org/10.1109/ACCESS.2020.2983175
Volume 3, Issue 4
Autumn 2020
Pages 251-259

  • Receive Date 24 July 2020
  • Revise Date 10 November 2020
  • Accept Date 27 December 2020