The International Arab Journal of Information Technology (IAJIT)


Optimal Image Based Information Hiding with

Information hiding is a technology aimed at the secure hiding of important information into digital documents or media. In this paper, a new approach is proposed for the secure hiding of information into gray scale images. The hiding is performed in two stages. In the first stage, the binary bits in the sequence of information are shuffled and encoded with a set of integer keys and a system of one-dimensional logistic mappings. In the second stage, the resulting sequence is embedded into the gray values of selected pixels in the given image. A dynamic programming method is utilized to select the pixels that minimize the difference between a cover image and the corresponding stego image. Experiments show that this approach outperforms other information hiding methods by 13.1% in Peak Signal to Noise Ratio (PSNR) on average and reduces the difference between a stego image and its cover image to 0 in some cases.

[1] Abbasi R., Bin L., Chughtai G., Hassan H., Iqbai M., and Xu L., “A New Multilevel Reversible Bit-Planes Data Hiding Technique Based on Histogram Shifting of Efficient Compressed Domain,” Vietnam Journal of Computer Science, vol. 5, no. 5, pp. 185-196, 2018.

[2] Abdeljawad T., Banerjee S., and Wu G., “Discrete Tempered Fractional Calculus for New Chaotic Systems with Short Memory and Image Encryption,” Optik, vol. 218, pp. 163698, 2020.

[3] Alghafis A., Munir N., Khan M., and Hussain I., “An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System,” International Journal of Theoretical Physics, vol. 59, pp. 1227-1240, 2020.

[4] Arbelaez P., Maire M., Fowlkes C., and Malik J., “Contour Detection and Hierarchical Image Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 5, pp. 898-916, 2011.

[5] Chai X., Gan Z., Yuan K., Chen Y., and Liu X., “A Novel Image Encryption Scheme Based on DNA Sequence Operations and Chaotic Systems,” Neural Computing and Applications, vol. 31, pp. 219-237, 2019.

[6] Chang C. and Tseng H., “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letters, vol. 25, no. 12, pp. 1431-1437, 2004.

[7] Chen E., Min L., and Chen G., “Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption,” International Journal of Bifurcation Chaos, vol. 27, no. 3, pp. 1-17, 2017.

[8] Clark K., Vendt B., Smith K., Freymann J., Kirby J., Koppel, P., Moore S., Phillips S., Maffitt D., Pringle M., Tarbox L., and Prior F., “The Cancer Imaging Archive (TCIA): Maintaining and Operating a Public Information Repository,” Journal of Digital Imaging, vol. 26, no. 6, pp. 1045-1057, 2013.

[9] Fan Y., Liao Y., and Li F., Zhou S., Zhang G., “Identity-Based Auditing for Shared Cloud Data with Efficient and Secure Sensitive Information Hiding,” IEEE Access, vol. 7, pp. 114246- 114260, 2019.

[10] Hamza R., “A Novel Pseudo Random Sequence Generator for Image-Cryptographic Applications,” Journal of Information Security Applications, vol. 35, pp. 119-127, 2017.

[11] Jain A. and Rajpal N., “A Robust Image Encryption Algorithm Resistant to Attacks Using DNA and Chaotic Logistic Maps,” Multimedia Tools and Applications, vol. 75, pp. 5455-5472, 2016.

[12] Kelkar V., Tuckley K., and Nemade H., “Novel Variants of A Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity,” Journal of Healthcare Engineering, vol. 2017, 2017.

[13] Khalil M., “Medical Image Steganography: Study of Medical Image Degradation when Embedding Data in the Frequency Domain,” International Journal of Computer Network Information Security, vol. 9, no. 2, pp. 22-28, 2017.

[14] Khosravi M. and Yazdi M., “A Lossless Data Hiding Scheme for Medical Images Using A Hybrid Solution Based on Ibrw Error Histogram Computation and Quartered Interpolation with Greedy Weights,” Neural Computing and Applications, vol. 30, no. 7, pp. 2017-2028, 2018.

[15] Li M., Lu D., Wen W., Hua R., and Zhang Y., “Cryptanalyzing A Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System And Cellular Automata,” IEEE Access, vol. 6, pp. 47102-47111, 2018.

[16] Lin C., Chang C., and Wang, Z., “Reversible Data Hiding Scheme Using Adaptive Block Truncation Coding Based on an Edge-Based Quantization Approach,” Symmetry, vol. 11, no. 6, pp. 765, 2019.

[17] Liu Y., Chang C., and Nguyen T., “High Capacity Turtle Shell-Based Data Hiding,” IET Image Processing, vol. 10, no. 2, pp. 130-137, 2016.

[18] Liu Z. and Pun C., “Reversible Data-Hiding in Encrypted Images by Redundant Space Transfer,” Information Sciences, vol. 433, pp. 188-203, 2018, 10 The International Arab Journal of Information Technology, Vol. 19, No. 1, January 2022

[19] Liu Y., Yang C., Sun Q., Wu S., Lin S., and Chou Y., “Enhanced Embedding Capacity for the SMSD-Based Data-Hiding Method,” Signal Processing: Image Communication, vol. 78, pp. 216-222, 2019.

[20] Liu Y., Chang C., Huang P., and Hsu C., “Efficient Information Hiding Based on Theory of Numbers,” Symmetry, vol. 10, no. 1, 2018.

[21] Lu T., Tseng C., Huang S., and Nhan T., “Pixel- Value-Ordering Based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy,” Symmetry, vol. 10, no. 12, pp. 764, 2018.

[22] Luo Y., Qin J., Xiang X., Tan Y., Liu Q., and Xiang L., “Coverless Real-Time Image Information Hiding Based on Image Block Matching and Dense Convolutional Network,” Journal of Real-Time Image Processing, vol. 17, pp. 125-135, 2020.

[23] Song Y., Song J., and Qu J., “A Secure Image Encryption Algorithm Based on Multiple One- Dimensional Chaotic Systems,” in Proceedings of the 2nd IEEE International Conference on Computer and Communications, Chengdu, pp. 584-587, 2016.

[24] Suthanthiramani P., Sannasy M., Sannasi G., and Arputharaj K., “Secured Data Storage and Retrieval Using Elliptic Curve Cryptography In Cloud,” The International Arab Journal of Information Technology, vol. 18, no. 1, pp. 56- 66, 2021.

[25] Teng L., Wang X., and Meng J., “A Chaotic Color Image Encryption Using Integrated Bit- Level Permutation,” Multimedia Tools and Applications, vol. 77, pp. 6883-6896, 2018.

[26] Wang C., Wu N., Tsai C., and Hwang M., “A High Quality Steganographic Method with Pixel- Value Differencing and Modulus Function,” The Journal of Systems and Software, vol. 81, no.1, pp. 150-158, 2008.

[27] Wu H., Wu N., Tsai C., and Hwang M., “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings Vision, Image and Image Signal Process, vol. 152, no. 5, pp. 611-615, 2005.

[28] Zhang S., Gao T., and Yang L., “A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images,” International Journal of Network Security, vol. 18, no. 4, pp. 718-727, 2016.

[29] Zhu S. and Zhu C., “Image Encryption Algorithm with an Avalanche Effect Based on A Six- Dimensional Discrete Chaotic System,” Multimedia Tools and Applications, vol. 77, pp. 29119-29142, 2018. Yinglei Song received his Ph.D. in computer science from the University of Georgia, USA in 2006. He worked as an assistant professor of computer science at the University of Maryland Eastern Shore, USA from 2007 to 2012. He is currently with the School of Electronics and Information Science at Jiangsu University of Science and Technology, China. His research interests include information hiding, algorithms for image processing, machine learning, bioinformatics and data mining. Jia Song received her Ph.D. in computer science from Zhejiang University, China in 2014. She is currently with the Department of Electronic and Information Technology, Suzhou Vocational University, China. Her research interests include information hiding, chaotic systems, operating systems, bioinformatics algorithm design. Junfeng Qu received his Ph.D. in computer science from the University of Georgia, USA in 2006 and joined the Department of Information Technology and Computer Science at Clayton State University as an assistant professor in that year. He is currently with the Department of Computer Science and Information Technology at the Clayton State University, USA. His research interests include information hiding, image processing, machine learning and bioinformatics.