Sie sind auf Seite 1von 5

The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 2, No.

2, March-April 2014

An Overview of Image Hiding


Techniques in Image Processing
R. Rathna Krupa*
*Department of Information Technology, The Standard Fireworks Rajaratnam College for Women, Sivakasi, Tamilnadu, INDIA.
E-Mail: rathnakrupa89@gmail.com

Abstract—Image hiding techniques embed a secret image into another image. The fusion of the secret image
and the cover image is the resultant stego image. Using the image hiding techniques, existence of the secret
image in the final image will be unaware by an unintended observer, so that it can be relocated carefully. One
of the common techniques is the LSB (Least Significant Bit) substitution method. It includes the manipulation
of the least significant bits in the original image. To enhance the quality of the final image the Optimal Pixel
Adjustment Process - OPAP which disarranges the image bits is used. In this paper, different types of LSB
schemes and image enhancing schemes are focused.
Keywords—Embedding Techniques; Image Embedding; Image Hiding; Least Significant Bits Substitution;
Optimal Pixel Adjustment Process.
Abbreviations—Least Significant Bit (LSB); Mean Square Error (MSE); Moderately Significant bit (MSB);
Optimal Pixel Adjustment Process (OPAP).

I. INTRODUCTION operations such as filtering, resampling, lossy compression,


etc. But in Image Hiding, it is mainly used to transmit

I
NTERNET has become more popular and common now- important and confidential images, whose size tends to be
a-days. Sending the important data through the net has very large.
become a serious threat. Moreover routing the data in an Many image hiding methods have been proposed by
encrypted format is very common and embedding the secret Thien & Lin (2003), Chan & Cheng (2004), Li Zhi & Sui Ai
message in an image is a challenge. To safeguard the images Fen (2004), Wang & Tsai (2007), Wang & Moulin (2007)
from the illegal hindrance or interception, techniques such as and many more. Most of these methods does not consider
watermarking, image hiding is used for the safe transmission about the compressing of cover image. But Chung et al.,
of images. This paper focuses on such techniques and ideas. (2001) proposed the usage of singular value decomposition
A watermark is a signal or a pattern that is embedded into an and vector quantization for compressing the cover image. The
image. It is usually done for content authentication. goal of the image hiding technique is to hide the secret image
Watermarking methods are divided into: fragile in such a way that it is invisible to the viewers.The Least
watermarking methods and robust watermarking methods. In Significant Bit substitution method and Optimal Pixel
robust watermarking methods, the secret information will Adjustment process are the two image hiding techniques in
always be robust against any changes or malfunctions. They which the LSB method is used for embedding the secret
are usually used for protecting copyrights. On the other hand, image and the OPAP method is used for enhancing the final
fragile watermarking methods are usually designed so that image so that the presence of the secret image is not visible.
they can easily get broken. Therefore it is applicable for Wang et al., (2001) proposed a method called the Moderately
tamper detection and authentication. Chandramouli & Nasir Significant Bit (MSB) where the fourth bit is taken into
Memon (2001) has used the watermarking technique with account for image hiding. This paper deals with all the facts
public key verification for watermark insertion and extraction used for the procedure of hiding the image and making the
procedure. This can be used for fingerprinting, ownership secret message invisible to the grabbers.
assertion and for ID-card security purpose. Image This paper is organized as follows. The section II gives
authentication against the quantization attack has been the details of how the LSB method works for hiding an image
proposed by Hongtao Lu et al., (2003). and the other algorithms that is suggested for efficient image
In watermarking, the size of the symbol should be hiding mechanism. The section III describes the Optical Pixel
usually small, ranging from one bit to thousands of bits to Adjustment Process which is used to improve the quality of
represent the symbol. The goal of watermarking focuses on the resultant image, so that the embedded image is unlikely to
the existence of the symbol which is usually small after be seen by naked eyes. The section IV describes the statistical
undergoing certain manipulations and by degrading analysis process to measure the quality of the final image.

ISSN: 2321-2381 © 2014 | Published by The Standard International Journals (The SIJ) 30
The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 2, No. 2, March-April 2014

The section V explains about the experimental results. In the Dumitrescu et al., (2003) used a technique that is based
final section the conclusion of this survey and future work on a finite state machine whose states are selected multisets
about image hiding is reported. The objective of this study is of sample pairs, called trace multisets. Some of the trace
to know about the image hiding techniques and means to multisets are equal in their expected cardinalities, if the
enhance the quality of the image after an image is embedded sample pairs are drawn from a digitized continuous signal.
into it so that protection of the data is maintained. Random LSB flipping causes transitions between these trace
multisets with given probabilities, consequently alters the
statistical relations between the cardinalities of trace
II. LEAST SIGNIFICANT BIT SUBSTITUTION multisets.
METHOD The method proposed by Puech (2009) combines
compression, data hiding and partial encryption of images in
Every pixel in an image indicates a color and the each image
a single processing step. This approach can embed data into
is made up of pixels. The lower values of the pixel in a gray -
the image according to the message size and partially encrypt
scale image signifies dark areas and the higher values signify
the image and the message without changing the original
light areas. So in order to adjust the shades of the image its
image content.
values can be adjusted and 8 bits are required to represent
LSB based techniques pose a difficult challenge to a
these values [Lin-Yu Tseng et al., 2008].
stego-analyst as it is difficult to differentiate final image and
For example consider the following 8-bit binary
the cover image which is given as input. The differences
sequence: 10110011. Summing up all these values where 1
between them will be very slight. Major advantage of this
exists, will yield a result of 179. The right-most value is the
method is, it is quick and easy. This method works well with
LSB of this sequence. This value essentially determines
gray scale images. It is mainly used for image integrity. The
whether the total sum is odd or even. If the LSB is a 1, then
quality of the embedding result cannot be degraded so
the total will be an odd number, and if 0, it will be an even
significantly that the grabbers may notice the existence of the
number. However, changing the LSB value from a 0 to a 1
important data [Ran-Zan Wang et al., 2001].
does not have a huge impact on the final result. Each 8-bit
binary sequence is used for expressing the color of a pixel for
an image, so changing the LSB value from a 0 to 1 does not
impose a major change and it is unlikely to be noticed by an
observer. In fact, the LSBs of each pixel value could be
potentially modified, and the changes would still not be
visible. This provides an enormous amount of redundancy in
the image data, which means that we can effectively
substitute the LSBs of the image data, with each bit of the
message data until the entire message has been embedded.
This is meant by Least Significant Bit Substitution Method.
The procedures used in the LSB method are:
 Get the input cover image and message image.
 Resize the message image same as that of cover
image.
Figure 1: Cover Image
 Shift the message image pixel values over four bits
to right. Figure 1 is the cover image in which the message image
 Make last four bits (LSBs) in the pixel values of the is going to be hidden. It is a grey scale image and this is the
cover image to zero. image which will be seen clearly by the viewer.
 Finally add the images obtained from step 3 and 4 to
get final image.
There are other several LSB techniques used for image
hiding. They are:
 LSB array based technique using encryption by RSA
algorithm in which four least significant bits are
explored by Gandharba Swain & Saroj Kumar
Lenka (2012).
 Transforming LSB Substitution for Image-based
Steganography in Matching Algorithms [Cheng-
Hsing Yang & Shiuh-Jeng Wang, 2010].
 LSB substitution based on image blocks and
maximum entropy [Mohamed Radouane et al.,
2013]. Figure 2: Secret Image/Message Image

ISSN: 2321-2381 © 2014 | Published by The Standard International Journals (The SIJ) 31
The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 2, No. 2, March-April 2014

Figure 2 is the secret image that is going to be embedded 2.3. Pixel Value Differencing
in the cover image. This image is also a grey scale image in In this method the cover image is divided into blocks that
which the each pixel is shifted right for undergoing the LSB consist of two consecutive pixels and the difference between
method. them is also calculated. If the difference is large then it means
they are present at the edged areas otherwise they are present
at smooth areas. The pixel in the edged area can have larger
amount of pixel values. So, more data can be hidden in the
edged areas [Rahul Samant & Shrikant Agrawal, 2011].
Before embedding, the difference value is then replaced by
the new value. This method is more efficient than the LSB
replacement scheme and it is more easy and feasible too.

III. OPTIMAL PIXEL ADJUSTMENT PROCESS


An optimal pixel adjustment process is proposed to enhance
the quality of the final image obtained by the simple LSB
substitution method. Moreover, the Optimal Pixel Adjustment
Process only requires a checking of the embedding error
between the original cover image and the final image
Figure 3: Result of LSB Method obtained by the LSB method to form the final enhanced final
After applying the LSB method the resultant image is the image.
one that is given in Figure 3.In Figure 3 the secret image is In-order to improve the quality different techniques has
slightly visible when it is seen keenly. This can be tackled by been followed. Zhang and Wang introduced Exploiting
using some image enhancing algorithms such as Optimal Modification Direction (EMD). Furthermore Lee et al.,
Pixel Adjustment Process. (2007) proposed an improved scheme where it uses two
pixels at a time, and gives both pixels a fixed evaluation
2.1. Optimal LSB value. Both these techniques get compromised if encryption
When LSB method is used for data hiding, the resultant techniques become public. So Wen-Chung Kuo (2013) used
image which is the stego image has only small differences two kinds of weight-changing evaluation EMD data hiding
when compared with the cover image, but the differences can strategy. One of them uses the table checking and the other
be easily detected using statistical analysis. So Optimal LSB uses EMD data hiding.
insertion which is an enhanced method is used for getting According to the Optimal Pixel Adjustment Process if
more accurate stego image. In this method an adjustment the error lies between the particular range, then pixels of the
process is used to find the correct matching pixel. The closest image that is retrieved after the LSB method is manipulated
pixel value when compared with the secret image to that of accordingly and then the enhanced image pixel is processed.
cover image is selected and then embedding is done in that For example if the error lies between 2 k-1 to 2k and if the pixel
optimal pixel. This method is more efficient, but finding the of the image that is produced from the LSB method is greater
closest pixel requires an additional phase. This method first than 2k then the pixel present in the final enhanced image is
starts by initialising three pixel values and comparison takes processed with the pixel from the LSB method otherwise the
place with the cover image pixel which is used to improve the enhanced image pixel will be similar to the input image pixel.
quality and decrease the error in the stego image [Morteza In the same way if the error lies between -2k-1 to 2k-1, the pixel
Bashardoost et al., 2013]. in the enhanced image will not be modified [Chi-Kwong
Chan & Cheng, 2001].
2.2. LSB Matching Scheme
The LSB Matching scheme also modifies the least significant
bits of the pixel for hiding the image but if any one of the bit
in the secret image does not match the LSB of the cover
image, then random addition or subtraction of the bits from
the cover image pixel takes place [Ker, 2004]. In this process
if the number of bits in the message image is lesser than the
cover image, then pseudo-random permutation is used to deal
with it. In the LSB replacement scheme the LSB’s of the
cover image is overwritten by the secret bit stream and the
other procedures are similar to the LSB Matching Scheme. It
has an advantage of being computationally less complex
when compared with other schemes.
Figure 4: Result of Optimal Pixel Adjustment Process

ISSN: 2321-2381 © 2014 | Published by The Standard International Journals (The SIJ) 32
The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 2, No. 2, March-April 2014

Figure 4 is the final image where the image that is Wei Liu et al., (2010) proposed a resolution progressive
retrieved after undergoing the LSB method is used in the compression scheme which compresses an encrypted image
OPAP process as the input image. progressively in resolution, such that the decoder can observe
This Optimal Pixel Adjustment Process improves the a low-resolution version of the image, study local statistics
quality of the final image, by reducing the Mean Square Error based on it, and use the statistics to decode the next resolution
between the cover image and the final image. So the hackers level.
will not be aware of the secret image hidden in it. The
Computational complexities are also reduced considerably.
By doing simple adjustment in the pixel values, the enhanced
IV. STATISTICAL ANALYSIS
image can easily obtained. Once the image is sent over the Then statistical analysis is done in order to study the quality
internet, the receiver receives it and uses a simple image of the images that is obtained from LSB substitution and
retrieval algorithm to retrieve the message in it. There will be OPAP process. The Mean Square Error (MSE) and the Peak
some degradation of message quality due to loss of least Signal to Noise Ratio (PSNR) are the two error metrics used
significant bits. So the contrast will be decreased slightly but to compare image compression quality. Mean Square Error
this will be negligible. (MSB) is used to estimate the quality difference between the
original cover image and the final image. The value of MSE
Message
should be as low as possible so that the quality of the
Cover Image resultant image is same as the cover image that was given as
Image
input. The value of the MSE will be equal to zero for
identical Images.
Peak signal-to-noise ratio (PSNR) represents a measure
of the peak error. The higher the PSNR value, the better the
Least Significant Bit quality of the final image. The equation for PSNR is,
Substitution Method (255 )2
PSNR = 10log 𝑑𝐵.
MSE
The MSE value is necessary to calculate the value of
PSNR [Lin-Yu Tseng et al., 2008].
Stego Image

V. EXPERIMENTAL RESULTS
Optimal Pixel This section presents experimental results obtained from two
Adjustment Process images. The first image is the cover image and the second
one is the secret image. Whenever, according to the
procedure done in Section III and Section IV which is the
Enhanced LSB and OPAP process, the Mean Square Error for the stego
Image image is 42.06. The error will be even more higher if the
Optical Pixel Adjustment Process is not made and that will be
the reason for the slight visibility of the secret image in the
Figure 5: Overall Process of Image Hiding cover image. When genetic algorithm is imposed in the final
Figure 5 represents the complete process of the image stego image the error will be decreased and the quality will
hiding mechanism in which the enhanced image with also be enhanced considerably.
minimum Mean Square Error is achieved. The enhanced Therefore, a good image hiding method should be easy
image which is the final image will have the embedded image to use and at the same time, the presence of the secret image
hidden in it and it would be unseen by any observer or should not be viewable. i.e. the value of Mean Square Error
viewer. To find the difference between the cover image and should be lesser and the PSNR value should be greater to get
final image statistical analysis method should be performed. a proper enhanced result.

3.1. Recovery Process


VI. CONCLUSION
In order to recover the secret image at the receiver’s side the
pixel of the image that is shifted left at the LSB process The main goal of this paper is to show how secret image can
should be shifted right. The procedures are: be embedded and how it can be sent through the internet by
 Get the retrieved image as input. fooling grabbers. Many problems are encountered when
 Shift the message image pixel values over four bits transferring important data over the network. A safe and
to the left. secure procedure is needed to transfer them easily. For this
 Message image is obtained. purpose simple image hiding techniques are used and the
quality of stego images is also improved by using different
mechanisms. So the hackers may not the stego image and will

ISSN: 2321-2381 © 2014 | Published by The Standard International Journals (The SIJ) 33
The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 2, No. 2, March-April 2014

know nothing about the embedded secret image in it. The [10] A. Ker (2004), “Improved Detection of LSB Steganography in
experimental results show that the stego image and the cover Grayscale Images”, Proceedings of 6th International
image remain more or less identical which is the main focus Workshop, Toronto (Canada), Vol. 3200, Pp. 97–115.
[11] Y. Wang & P. Moulin (2007), “Optimized Feature Extraction
of this paper. This means that a secret message can be sent to for Learning-Based Image Steganalysis”, IEEE Transactions
the destination without any glitch and this can be used for Information Forensics Security, Vol. 2, No. 1, Pp. 31–45.
image integrity protection and in places where important, [12] C.F Lee, Y.R. Wang & C.C. Chang (2007), “A Steganographic
undisclosed secrets should be sent to the recipient. Research Method with High Embedding Capacity by Improving
is going on in privacy protection and intellectual property Exploiting Modification Direction”, IIHMSP, Kaohsiung, Pp.
rights protection. 497–500.
[13] R. Wang & Y. Tsai (2007), “An Image-Hiding Method with
In the future, it is expected to find an even better High Hiding Capacity based on Best-Block Matching and K-
technique and procedure to hide more data in a cover image. Means Clustering”, Pattern Recognition, Vol. 40, No. 2, Pp.
The future focus should be made on even more less 398–409.
modification in the cover image and the differences between [14] W. Puech (2009), “Image Encryption and Compression for
the cover image and the stego image should be null when Medical Image Security”, Proceeding of IEEE Image
statistically analyzed. Processing Theory, Tools & Applications, Pp. 1–2.
[15] Wei Liu, Wenjun Zeng, Lina Dong & Qiuming Yao (2010),
“Efficient Compression of Encrypted Grayscale Images”, IEEE
REFERENCES Transactions on Image Processing, Vol. 19, No. 04, Pp. 1097–
1102.
[1] Ran-Zan Wang, Chi-Fang Lin & Ja-Chen Lin (2001), “Image
[16] Rahul Samant & Shrikant Agrawal (2011), “Data Hiding in
Hiding by Optimal LSB Substitution and Genetic Algorithm”,
Gray-Scale Images using Pixel Value Differencing”,
International Conference on Pattern Recognition, Vol. 34, Pp.
Technology Systems and Management Communications in
671–683.
Computer and Information Science, Vol. 145, Pp. 27–33.
[2] R. Chandramouli & Nasir Memon (2001), “Analysis of LSB
[17] Gandharba Swain & Saroj Kumar Lenka (2012), “A Technique
based Image Steganography Techniques”, Proceedings of
for Secret Communication for New Block Cipher using
International Conference on Image Processing, Vol. 3, Pp.
Dynamic Stegnography”, International Journal of Security and
1019–1022.
its Applications, Vol. 6, No. 2, Pp. 1–12.
[3] K.L. Chung, C.H. Shen & L.C. Chang (2001), “A Novel SVD-
[18] Mohamed Radouane, Tarik boujiha, Rochdi messoussi, Nadia
and VQ-based Image Hiding Scheme”, Pattern Recognition
Idrissi & Ahmed Roukh (2013), “A Method of LSB
Letters, Vol. 22, Pp. 1051–1058.
Substitution based on Image Blocks and Maximum Entropy”,
[4] Chi-Kwong Chan & L.M. Cheng (2001), “Improved Hiding
IJCSI International Journal of Computer Science Issues, Vol.
Data in Images by Optimal Moderately Significant-Bit
10, No. 1, Pp. 371–374.
Replacement”, IEEE Electronics Letters, Vol. 37, No. 16,
[19] Morteza Bashardoost, Ghazali Bin Sulong & Parisa Gerami
Pp.1017–1018.
(2013), “Enhanced LSB Image Steganography Method by
[5] C.C. Thien & J.C. Lin (2003), “A Simple and High-Hiding
using Knight Tour Algorithm Vigenere Encryption and LZW
Capacity Method for Hiding Digit-by-Digit Data in Images
Compression”, IJCSI International Journal of Computer
based on Modulus Function”, International Conference on
Science Issues, Vol. 10, No. 2, Pp. 221–225.
Pattern Recognition, Vol. 36, No. 12, Pp. 2875–2881.
[20] Wen-Chung Kuo (2013), “Data Hiding Schemes based on the
[6] Hongtao Lu, Ruiming Shen & Fu-lai Chung (2003), “Fragile
Formal Improved Exploiting Modification Direction Method “,
Watermarking Scheme for Image Authentication”, IEEE
Applied Mathematics & Information Sciences Letters, Pp.81–
Electronics Letters, Vol. 39, No. 12, Pp. 898–900.
88.
[7] S. Dumitrescu, Xiaolin Wu & Zhe Wang (2003), “Detection of
LSB Steganography via Sample Pair Analysis”, IEEE R. Rathna Krupa received the degree in
Transactions on Signal Processing, Vol. 51, No. 7, Pp. 355– Master of Science for computer science and
372. Information Technology under Madurai
[8] C.K. Chan & L.M. Cheng (2004), “Hiding Data in Images by Kamarajar University, Madurai. She has
Simple LSB Substitution”, Pattern Recognition, Pp. 469–474. worked in open source projects at a private
[9] Li Zhi & Sui Ai Fen (2004), “Detection of Random LSB Image company in Rajapalayam, Virudhunagar.
Steganography”, Vehicular Technology Conference, Vol. 3, Pp. She has some special interests on research
2113–2117. fields like image processing, data hiding and
embedding.

ISSN: 2321-2381 © 2014 | Published by The Standard International Journals (The SIJ) 34

Das könnte Ihnen auch gefallen