Secure Pixel-Level Data Concealment: A Novel Approach for Securing Black and White Images within Color Images

Main Article Content

Sriharipriya K. C., J. Christopher Clement, Gerardine Immaculate Mary, M. Supriya, Sivakumar Annamalai, Somu Nikhil Reddy

Abstract

In the era of rampant digital data transfer, concerns regarding the secure and reliable transmission of information persist, with numerous attempts at concealing and transporting data globally. Despite the plethora of existing techniques, issues persist, ranging from misinterpretation to malicious misuse of data during the transfer process. To address some of these challenges, this research introduces an innovative method centered on the modification of pixel data to embed concealed information. The primary objective is to alter pixel values in a manner that accommodates the storage of data pertaining specifically to black and white image pixel data. The proposed technique is designed to exclusively encode information related to two-pixel values, with careful adjustments made to ensure the masked image remains non-deceptive. Pixel values undergo subtle alterations to mitigate susceptibility issues associated with corner values, particularly at the border values of 254 and 255 for RGB values. The developed method presents a simplified yet robust data hiding technique, allowing the storage of black and white images within color images while achieving a high Peak Signal-to-Noise Ratio (PSNR) compared to standard ".png" images. Crucially, the developed approach addresses the challenge of minimizing drastic changes in pixel color, enhancing the overall fidelity of the stego image. Furthermore, the versatility of the proposed method is showcased by its potential to accommodate more than three images when the stego image size is appropriately large and segmented. A practical and efficient solution has been contributed to the persistent issues associated with secure data transfer, presenting a novel methodology for concealing black and white images within color images.

Article Details

Section
Articles
Author Biography

Sriharipriya K. C., J. Christopher Clement, Gerardine Immaculate Mary, M. Supriya, Sivakumar Annamalai, Somu Nikhil Reddy

[1]*Sriharipriya K. C.

2J. Christopher Clement

3Gerardine Immaculate Mary

4M. Supriya

5Sivakumar Annamalai

6Somu Nikhil Reddy

 

[1]*Corresponding author: sriharipriya.kc@vit.ac.in

1,2,3,6 School of Electronics Engineering, Vellore Institute of Technology, Vellore, India.

4 Department of Computer Science and Engineering, Stella Mary's College of Engineering, India

5 Department of Safety & Fire Engineering, Excel Engineering College, India.

Copyright © JES 2024 on-line: journal.esrgroups.org

References

J. Mielikainen, "LSB matching revisited," in IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, May 2006, doi: 10.1109/LSP.2006.870357.

Badr, S. and Noufal, P., 2016. Integrated data hiding and compression scheme based on SMVQ and FoE inpainting. Procedia Technology, 24, pp.1008-1015.

Chang, C.C., Kieu, T.D., Chou, Y.C.,2009. A lossless data embedding technique by joint neighboring coding, Pattern Recognition 42(7):1597- 1603

Chang, C.C., Kieu, T.D., Chou, Y.C.,2009a. Reversible information hiding for VQ indices based on locally adaptive coding, Journal of Visual Communication and Image Representation 20(1):57-64

S. Lee, C. D. Yoo and T. Kalker, "Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform," in IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 321-330, Sept. 2007, doi: 10.1109/TIFS.2007.905146.

Shen, S.Y. and Huang, L.H., 2015. A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security, 48, pp.131-141.

Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 4, pp. 497-509, April 2008, doi: 10.1109/TCSVT.2008.918761.

Mali, S.N., Patil, P.M. and Jalnekar, R.M., 2012. Robust and secured image-adaptive data hiding. Digital Signal Processing, 22(2), pp.314-323.

Zhicheng Ni, Yun-Qing Shi, N. Ansari and Wei Su, "Reversible data hiding," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, March 2006, doi: 10.1109/TCSVT.2006.869964.

Lerch-Hostalot, D. and Megias, D., 2013. LSB matching steganalysis based on patterns of pixel differences and random embedding. Computers & security, 32, pp.192-206.

Wang, P., He, X., Zhang, Y., Wen, W. and Li, M., 2019. A robust and secure image sharing scheme with personal identity information embedded. Computers & Security, 85, pp.107-121.

Raju, K.U. and Prabha, N.A., 2021. Dual images in reversible data hiding with adaptive color space variation using wavelet transforms. International Journal of Intelligent Unmanned Systems.

Al‐Omari, F.A., Al‐Khaleel, O.D., Rayyashi, G.A. and Ghwanmeh, S.H., 2012. An innovative information hiding technique utilizing cumulative peak histogram regions. Journal of Systems and Information Technology.

Nipanikar, S.I. and Deepthi, V.H., 2017. Wavelet transform-based steganographic method for secure data communication using OFDM system. International Journal of Intelligent Computing and Cybernetics.

Najafi, H.L., 2010. A neural network approach to digital data hiding based on the perceptual masking model of the human vision system. International Journal of Intelligent Computing and Cybernetics.

Pratt, M.A., Konda, S. and Chu, C.H.H., 2008. Texture‐based image steganalysis by artificial neural networks. International Journal of Intelligent Computing and Cybernetics.

Wu MN., Lin MH., Chang CC. (2004) A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. In: Chi CH., Lam KY. (eds) Content Computing. AWCC 2004. Lecture Notes in Computer Science, vol 3309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30483-8_27

Singh, Arun Kumar, Juhi Singh, and Harsh Vikram Singh. "Steganography in images using lsb technique." International Journal of Latest Trends in Engineering and Technology (IJLTET) 5, no. 1 (2015): 426-430.

Mohamed, Marghny H., and Hussein I. Abul-Kasim. "Data hiding by lsb substitution using gene expression programming." International Journal of Computer Applications 975 (2012): 8887.

Karakış, R., İ. Güler, I. Capraz, and Erhan Bilir. "A novel fuzzy logic-based image steganography method to ensure medical data security." Computers in biology and medicine 67 (2015): 172-183.

Lai, Bo-Luen, and Long-Wen Chang. "Adaptive data hiding for images based on haar discrete wavelet transform." In Pacific-Rim Symposium on Image and Video Technology, pp. 1085-1093. Springer, Berlin, Heidelberg, 2006.

Juneja, M., & Sandhu, P. (2013). An Improved LSB Based Steganography Technique for RGB Color Images. International Journal of Computer And Communication Engineering, 513-517.

N. A. Kumar, G. Shyni, Geno Peter, A. A. Stonier, and V. Ganji, “Architecture of Network-on-Chip (NoC) for Secure Data Routing Using 4-H Function of Improved TACIT Security Algorithm,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–9, Mar. 2022, doi: 10.1155/2022/4737569.

M., Marghny & Abulkasim, Hussein. (2012). Data Hiding by LSB Substitution using Gene Expression Programming. International Journal of Computer Applications. 45. 13-20.

Nipanikar, S.I., Deepthi, V.H. and Kulkarni, N., 2018. A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal, 57(4), pp.2343-2356.

Rabie, T., Baziyad, M. and Kamel, I., 2018. Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools and Applications, 77(18), pp.23673-23698.

Hemalatha, S., Acharya, U.D. and Renuka, A., 2015. Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 47, pp.272-281.

Swain, G., 2016. A steganographic method combining LSB substitution and PVD in a block. Procedia Computer Science, 85, pp.39-44.

Lu, T.C., Chang, C.C. and Huang, Y.H., 2014. High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimedia tools and applications, 72(1), pp.417-435.

Wu, H., Wang, H., Zhao, H. and Yu, X., 2015. Multi-layer assignment steganography using graph-theoretic approach. Multimedia Tools and Applications, 74(18), pp.8171-8196.

Aadhitya, S. V., and K. C. Sriharipriya. "Disease Detection and Diagnosis of Agricultural Plant Leaf Using Machine Learning." International Journal of Electrical and Electronics Research 11.3 (2023): 749-753.

A. Sherine and Geno Peter “A Novel Biometric Recognition System for Fingerprint Using Polar Harmonic Transform.” International Journal of Pharmaceutical Research, vol. 13, no. 01, Jan. 2021. DOI.org (Crossref), https://doi.org/10.31838/ijpr/2021.13.01.636.

A. Sherine, Geno Peter, A. A. Stonier, K. Praghash, and V. Ganji, “CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–12, Mar. 2022, doi: 10.1155/2022/6040902.

Mandal, Pratap Chandra, and Imon Mukherjee. "High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion." Multimedia Tools and Applications 81.4 (2022): 5325-5347.

Prabukumar, M., and J. Cristopher Clement. "Compressed Domain Contrast and Brightness Improvement Algorithm for Color Images through Contrast Measuring and Mapping of DWT Coefficients." International Journal of Multimedia and Ubiquitous Engineering 8.1 (2013): 55-69.