Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication

Ali Sheidaee, Leyli Mohammad Khanli

Article ID: 607
Vol 1, Issue 1, 2018

VIEWS - 235 (Abstract) 7 (PDF) 9 (PDF)

Abstract


Image steganography is a technique of embedding sensitive information in images. In literature, research articles proposed different image steganography schemes on cover images based on different algorithms. Withal, stego images have less quality in HVS and lower performance. Another topic in image steganography is the quality of extracted data in receiver side that can be affected by transmission channel options or even by the attacks on stego images in transmission channel. In this paper discrete cosine transform (DCT) function and Motion Blur (based on Richardson-Lucy algorithm) is used for secret image transformation and secured hash file of the transformed image generated with RSA cryptosystem therewith. The randomness property of the resultant image reduces the possibility of its detection by HVS and steganalysis techniques. Image data embedding applied with LSBMR substitution algorithm into another significant image. Image deconvolution addressed in recent articles that used different methods such as edge extractions, Richardson-Lucy algorithm, Regularized filters and etc. We apply the Richardson-Lucy deconvolution basics in final secret image extraction to remove the noise. Several experiments and comparative studies are further presented to verify the effectiveness of the proposed algorithm in terms of performance, stego image quality and secret images quality maintenance.

Keywords


Steganography; Richardson-Lucy; Motion blur; Authentication; Human Visual System (HVS).

Full Text:

PDF PDF


References


1. L. Bin, T. Shunquan, W. Ming and H. Jiwu. (2014). Investigation on cost assignment in spatial image steganography. IEEE Trans. Inf. Forensics Secur 9 (2014). 1264-1277.

2. G. Linjie, N. Jiangqun and S. Yun Qing. (2014). Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur 9 (2014). 814-825.

3. Ali Sheidaee and L. Farzinvash. (2017). A novel image steganography method based on DCT and LSB. 9th international conference on information and knowledge technology (ikt2017). IEEE - Amirkabir University of technology, Iran, Oct. 18-19, 2017.

4. A. Kanso and M. Ghebleh. (2017). an algorithm for encryption of secret images into meaningful images. Optics and lasers in engineering 90 (2017). 196-208.

5. K. Qazanfari and R. Safabakhsh. (2014). a new steganography method which preserves histogram: Generalization of LSB. Inform 277 (2014). 91-101.

6. W. Zhang, X. Zhang and S. Wang. (2007). a double layered “plus-minus one” data embedding scheme”. IEEE Signal Process 14 (2007). 848-851.

7. S. Sun. (2016). A novel edge based image steganography with 2k correction and Huffman encoding. Information Processing Letters 116 (2016). 93-99.

8. Meister. (2006). A Density estimation with normal measurement error with unknown variance. Statistica Sinica 16 (2006). 195–211.

9. Stefanski and Carroll. (1990). Deconvolving kernel density estimators. Statistics 21 (1990). 169–184.

10. Xiaofeng Dai. (2016). Non-parametric efficiency estimation using Richardson–Lucy blind deconvolution. European Journal of Operational Research 248 (2016). 731–739.

11. Guangmang Cui, Huajun Feng, Zhihai Xu and Li,Yueting Chen. (2014). A modified Richardson–Lucy algorithm for single image with adaptive reference maps. Optics & Laser Technology 58 (2014). 100–109.

12. Taiebeh Askari Javaran, Hamid Hassanpour and Vahid Abolghasemi. (2017). Non-blind image deconvolution using a regularization based on re-blurring process. Computer Vision and Image Understanding 154 (2017). 16–34.

13. Hao-Liang Yang, Po-Hao Huang and Shang-Hong Lai. (2014). A novel gradient attenuation Richardson–Lucy algorithm for image motion deblurring. Signal Processing 103 (2014) 399–414.

14. K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S.W. Baik. (2015). A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet Inf. Syst 9 (2015) 1938-1962.

15. W. Luo, F. Huang and J. Huang. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur 5 (2010). 201-214.

16. Y. Luo, M. Du and J. Liu. (2015). A symmetrical image encryption scheme in wavelet and time domain. Common Nonlinear Sci. Numer. Simul 20 (2015). 447-460.

17. Jianhua Wu, Mengxia Zhang and Nanrun Zhou. (2016). Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion. Journal of Modern Optics (2016).

18. J. Laaksonen, M. Koskela, S. Laakso and E. Oja. (2000). PicSOM–content-based image retrieval with self-organizing maps. Pattern Recognit. Lett 21 (2000). 1199-1207.

19. K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S.W. Baik. (2016). Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Generation Computer Systems (2016).

20. Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevit. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing 90 (2010). 727–752.

21. Mansi S. Subhedar, Vijay H. Mankar, Image steganography using redundant discrete wavelet transform and QR factorization, Computer and Electrical Engineering 54, 406-422, 2016.

22. Xin Liao, Zheng Qin, Liping Ding, Data embedding in digital images using critical functions, Signal Processing: Image Communication 58, 146–156, 2017.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.