International Journal of Electrical and Computer Engineering (IJECE) Vol. No. April 2013, pp. ISSN: 2088-8708 A Robust Steganography Method using Adjustable Parameters Ahmad R. Eskandari Digital Media Lab. AICTC Research Center. Department of Computer Engineering. Sharif University of Technology Article Info ABSTRACT Article history: In this paper, a new steganography method based on contourlet transform is Compared with the previous works, the proposed method causes far fewer distortions in high frequency coefficients. This significantly increases the quality of stegano image and extracted secret image and its robustness against to steganalysis algorithm. Furthermore, we proposed two adjustable parameters that could be suited in direction of changing the quality of stegano image and extracted secret images or its robustness against to attacks and steganalysis algorithms. Using these parameters, much better performance of storing data is accessible. The proposed algorithm has higher robustness against to steganalysis algorithm in comparison with related state of the art methods. Likewise, the experimental results show robustness respect to Gaussian noise and other attacks such as JPEG compression. Received Dec 28, 2012 Revised Feb 25, 2013 Accepted Mar 10, 2013 Keyword: Information hiding Steganography Image data hiding Countorlet transform Robust method Copyright A 2013 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ahmad R. Eskandari. Digital Media Lab. AICTC Research Center. Department of Computer Engineering. Sharif University of Technology. Tehran. Iran, eskandari@dml. INTRODUCTION Steganography is a branch of secret communication science with aim of hiding the communication by locating the message in a covering media so that the least discoverable change is created in the media. general, the available steganography methods can be divided in two groups of spatial and transformation In spatial domain, there are many strategies of image steganography based on manipulating the least significant bit using direct replacing of least significant bit levels with the bits of secret image. Because of the limitation of the total number of least significant bit levels in a cover image, these methods have appropriate outputs only when the size of secret image is small enough. To reach this goal, the secret image size is not bigger than 25 percent of the cover image size. Nevertheless, when the hidden message is big proportional to cover image, the quality of stegano image is low in these methods. Another group is related to methods that the embedding process is implemented through frequency domain and wavelet For instance the work presented in . , with using zero-padding features, the authors presented a steganography method based on image Fourier domain. In . a frequency domain method was proposed so that embedding is realized in bit planes of sub-band wavelet coefficients obtained by using the Integer Wavelet Transform. In the work proposed in . , a chaos based spread spectrum image steganography method is addressed. The majority of LSB steganography algorithm embed message in spatial domain such as pixel value differencing . The proposed method is among the transform domain methods which are based on hiding the secret image in block to block form. Many methods have been proposed which are based on the block to block storing in transform domain. In . , both the secret and cover images are divided into blocks. Then, for each secret block, the most similar block in cover image is found, and then the secret block is finally replaced by that block. In this method, using extracted features from Gabor domain, the most similar block is found. However, as the Gabor filter is a band pass filter, the extracted features donAot contain the low frequency hence this issue has a negative effect on quality of the created stegano image. In . , the authors proposed a method to embed the approximation coefficients of discrete wavelet transform of secret image. Journal homepage: http://iaesjournal. com/online/index. php/IJECE A ISSN:2088-8708 this case, low frequency coefficients of secret and cover image are divided into 4*4 blocks. Then for each block in approximation coefficients of secret image, the most similar block in approximation coefficients of cover image is found. However, instead of direct replacement, the difference between two blocks is calculated and this block is stored in the most similar block in high frequency coefficients of wavelet. Although this approach is efficient and robust against to many attacks, but in this approach, the stegano image doesnAot have high quality, and as we will see in simulation results, this approach doesnAot show the enough robustness against to steganalysis algorithms. The presented steganography approach is an improvement of the method in . The authors in . proposed a technique by which, the differences of two blocks of approximation coefficients stored in high frequency sub-bands of cover imageAos contourlet transform. One of the advantages of contourlet transform compared with other pyramidal transformations for steganography applications is the existence of linearly independent sub-bands. This issue decreases the possibility of detection of the stegano image by steganalysis Nevertheless, this technique could not significantly improve the quality of stegano image and extracted secret image. Because, the statistics of embed blocks are often far different from the statistics of high frequency coefficients. This issue which is also happens in wavelet domain, reduces the quality of stegano image, extracted secret image and even more, by distorting the distributions of high frequency coefficients reduces the robustness against to steganalysis algorithms. Here, we propose a method by which, only the authorized block is embedded in high frequency coefficients (An authorized block is the one that its statistics is similar to the statistics of high frequency coefficients and an unauthorized block is the one that its statistics is not similar t. We also proposed a method to convert an unauthorized block to an authorized block. By doing these, our technique significantly increases the quality of stegano image and extracted secret image and its robustness against to steganalysis Furthermore, we presented two adjustable parameters to manage between the quality of stegano image and extracted secret images or robustness against to attack and steganalysis algorithms. Moreover, we demonstrate that by using Oe instead of Euclidian distance, better results in terms of robustness and quality can be achievable. The rest of the paper is organized as follows: The proposed technique is described in section 2. Section 3 describes Statistical characterization of total error blocks coefficients. Section 4 shows experimental results and discussion. Finally, the conclusions of this paper are given in section 5. THE PROPOSED STEGANOGRAPHY METHOD The proposed technique is similar to the work in . Here we present the storing method of approximation coefficients which are more valuable parts of secret image compared with four other subbandsAo coefficients. Embedding Consider S and C as secret image and cover image respectively. Stage . at first, by applying contourlet transform we decompose the host image (C) into a subimage of low frequency coefficients CL and four sub-images of high frequency coefficients CH1. CH2. CH3 and CH4. In the same way, we decompose the secret image (S) into a sub-image of low frequency coefficients SL and four sub-images of high frequency coefficients SH1. SH2. SH3and SH4. Stage . we divide each of the sub-bands SL. CL. CH1. CH2. CH3 and CH4 into 4*4 blocks. this method, we can describe the mentioned sub-bands as follows: block in SL and block in CL respectively. If the blocks of CH1. CH2. CH3 and CH4 are put together, , is the block in the Sequence blocks extracted from CH1. CH2. CH3 and CH4. nsis the entire number of 4*4 blocks in SL and nc is the number of 4*4 blocks in each of the sub-bands CL. CH1. CH2. CH3 and CH4. is searched. Secret key k1 includes the Stage . for each block in , best matching block in addresses of the best matching blocks in In . the authors used the Euclidean distance for computing IJECE Vol. No. April 2013: 207Ae214 IJECE ISSN: 2088-8708 the similarity measure to find the matching block. But here we profit from the norm (P) distance for computing the similarity measure. In this work P is equal to 2. The advantage of using the norm (P) distance respect to the Euclidean distance is represented in part 3-1. Stage . Computation of error block as follows: Stage . finding the unauthorized error blocks and transforming them to the authorized blocks. The authorized block is the block that all of its members are smaller than the predetermined threshold ( If an unauthorized block is found, then the block is changed to the authorized block by multiplying all of its members by the predetermined factor<1. The method of computing the value of threshold ( ) and the factor is represented in the section 6-2. We get the corrected in this stage. is replaced with some LSA Stage . in this stage, the corrected error blocks method is used to find out the best matched blocks. For this purpose, the cost of replacing each error block in is computed by norm . Then, using LSA method, the matched block for each error all of blocksis computed. We can minimize the total cost of the entire replacing by using this block in In practice, this method improves the quality of stegano image. Moreover, regarding the fact that the total cost is minimum, we can conclude that the blocks are replaced with the least error that improves the quality of the extracted secret image. After replacing the error blocks, the second secret key k2 that includes the addresses of the best matching blocks in is produced. Then an extra bit is added to each address of k2 for identifying that the related error block is among the authorized blocks or not. Stage . In this stage, by applying inverse contourlet transform to CL. CH1. CH2. CH3 and CH4 the stegano image is created. Extracting Extracting process of secret image is as follows: Stage . Decompose of the stegano image by applying contourlet transform for getting the subimages GL. G H1. GH2. GH3. GH4. extracted by using of the first secret key from sub-image GL. The second Stage . The block secret key used for extracting the error block Stage . Using the bit that determines the type of block (Authorized or unauthorized bloc. , the members of unauthorized block are multiplied by , and the value of is returned to the initial state. is computed by the following equation: Stage . Repeat stages 2 and 3 until all of the secret blocks are extracted and form sub-image SL. Stage . By using the sub-bands SH1. SH2. SH3. SH4 that we receive from sender and by applying inverse contourlet transform We extract the hidden secret image. STUDY OF STATISTICAL CARACTRIZATION In this section, we discuss the statistical properties of the total error coefficients and the high frequency sub-bands of contourlet transform. Then, regarding the findings, we justify the using of norm p distance and also we explain how to calculate the threshold value Thr and coefficient. In the Figure 5, the distributions of the coefficients of the total error blocks and high frequency sub-bands coefficients of contourlet transform of cover image are shown. It should be mentioned that distribution of the total error blocks coefficients is meant the distribution of the matrix coefficients that is created by putting all the error blocks together. As could be seen in the Figure 5, the distribution of the total error coefficients follows the Gaussian model. This issue is verified by testing more samples. In the Table. 1, the mean and standard deviation of each distribution can be seen. As shown in Table. 1, there are clear differences between the standard deviation of the distribution of error blocks coefficients and distributions of the high frequency sub-bands coefficients in contourlet transform. According to the statistical parameters of the error blocks, we can realize that replacing these values in high frequency sub-bands coefficients of the contourlet with lower variance can reduce the quality of steganoimage. Furthermore, it occasionally happens that the error block coefficients are so large, so that after embedding and applying the inverse contourlet, the intensity value of A Robust Steganography Method using Adjustable Parameters (Ahmad R. Eskandar. A ISSN:2088-8708 some pixels of the stegano image becomes lower than zero or higher than 255. In this situation, because the intensity value of image is limited between zero and 255, the embedded information will be destroyed. This issue, in turn, could create error in retrieving secret image. Therefore, direct embedding of the error blocks can cause decreasing the quality of stegano and extracted secret images. In this work, we benefited from two different methods to solve the problem which are explained as follow: Figure 1. Distribution of error blocks coefficients and Distribution of high frequency sub-bands of contourletAos transform. Table1. Mean and standard variance of cover image contourletAos high frequency coefficients and also the distribution of total differences blocks coefficients for a sample secret image and itAos related cover. Total error Sub-band 1 Sub-band 2 Sub-band 3 Sub-band 4 Mean Standard deviation The way of computing the similarity According to the reasons that mentioned in the section 4, the members of error block that are used in the distance calculation should not be higher than a certain threshold. Here, for measuring similarity, we applied norm distance . instead of Euclidean distance . in order to increase the effect of members which create greater error: Equation 1 . is considered 2. This could cause that the members creating higher error play more important role in calculating distance and this, in turn, can significantly decrease the number of unauthorized blocks. It is essential to note that the large increase in p could also have a reverse effect. The reason is that, the more the high value members of error block are considered, the low value members of error block are less regarded. In other words, differences are more regarded than similarities and this issue will decrease the quality of stegano image. Using the threshold and the factor for converting unauthorized error block to authorized error block As mentioned before, the large values of error blocks can reduce the quality of stegano and extracted secret images. To solve this problem, if a member of a error block is more than a threshold value, the members of that block are multiplied by a factor smaller than 1, and so the destructive effect of that member is decreased. The threshold value is considered equal to time of the minimum of the standard deviations that computed from the distributions of high frequency sub-bandAos coefficients. In the above equation, the andE are the threshold value and the minimum standard deviation In our experiments, is considered equal to 4. The 4E is the value there are approximately 99% of absolute value of the high frequency coefficients less than this value. This threshold means that the members IJECE Vol. No. April 2013: 207Ae214 IJECE ISSN: 2088-8708 of error blocks should be placed in the range of 4E otherwise it will be regarded as an unauthorized block. When the block was not authorized, all its members are multiplied by a factor, and then embedded. This coefficient is calculated as follows: Here, is the maximum amount that each member of error block can reach. In this work. Occurs while calculating the error block, if one member of block this value was considered 500. from approximation coefficients of secret or host image is zero and another corresponding member has the maximum value of the approximation coefficients relevant to the contourlet transform. In practice, the can be considered less than its probability of this issue is very low, and for this reason, the maximum value. The following should be considered in determining the With increasing the threshold value, more blocks will be considered authorized, and for this reason, the quality of the stegano image is reduced. However, this can increase the quality of the extracted secret Because the quantization process which is done after the inverse contourlet transform in embedding stage. Cause the multiplying by factor during replacement and dividing by during retrieving will not exactly be reversed processes. As a result, error blocks must be less manipulated as far as possible to have better quality for extracted secret image. In addition, since with multiplying by factor in one block, all the members value are diminished, it is possible to create members with very small In this situation, these members become so sensitive to attacks such as noise and Gaussian bluer, and this issue with the presence of such attacks leads to reduction of the quality of the extracted secret However, since increasing increases the number of authorized blocks, this cause more disorder in the frequency model. therefore, the possibility of detection using steganalysis algorithms will be increased. value, the quality of stegano image increases, but the quality of the extracted By increasing the secret image is reduced. Because this will cause the coefficients of unauthorized error blocks would become smaller or in other words, it willbecome closer to the average value of high frequency sub-bands coefficients of contourlet transform. On the other hand, this operation causes the error blocks coefficients to be more manipulated, and as mentioned before, this will reduce the quality of the extracted secret imageand make it more sensitive to attacks such as noise and Gaussian blur. However, cause less disorder in the frequency model. therefore, the possibility of since increasing the detection using steganalysis algorithms will be decreased. Table 2. This table shows the variations of quality measure of stegano and extracted secret images and robustness against to attacks and steganalysises algorithm respect to increasing and decreasing Errormaxand The up arrow (I. means increase and the down arrow means decrease (I. (I. (I. Errormax (I. Errormax (I. quality of stego image (I. (I. (I. (I. quality of extracted image (I. (I. (I. (I. robustness against to detection (I. (I. (I. (I. robustness against to attack (I. (I. (I. (I. Figure 2. The distribution of error coefficients in initial state and after correction A Robust Steganography Method using Adjustable Parameters (Ahmad R. Eskandar. A ISSN:2088-8708 In the Table 2, we have demonstrated the effects of changes in and values in the quality of stegano image, the extracted secret image and also sensitivity to attacks and also detection algorithms. The up arrow (I. means increase and the down arrow means decrease (I. The Figure 6 illustrates the distribution of error coefficients in initial state and after converting unauthorized blocks to authorized blocks. As could be seen, the error distribution coefficients are very similar to the distribution of high frequency sub-bands coefficients of contourlet transform. RESULTS In this section we examined the performance of the proposed method in image quality, robustness against stegananalysis algorithm and attacks through three different experiments. The database contains 300 different gray-level format images derived from standard SIPI database in the University of Southern California and standard databases of CSIQ and Zurich Buildings. In each test, cover images and secret image size has been changed based on the tests implemented in previous works. All of the 300 images of database were generated in three different sizes: 256 y 256, 128 y 128 and 64 y 64. Firstly, we have investigated the robustness of the proposed method against to detection algorithms. As the proposed method applies changes in high frequency sub-bands, hence we used the algorithm presented in . to check the robustness of the proposed method. In the work . , with extracting the appropriate features from the high frequency coefficients of wavelet transform and using the Fisher's Classification algorithm, a new method is designed for identifying the stegano image from other non-containing messages . over imag. This algorithm can recognize stegano images with checking the imposed disorders in high frequency sub-bands of wavelet transform. The 300 images of 256*256 dimensions formed the cover database and the 300 images of 128 * 128 dimensions formed the secret database. For each secret image, a host image was randomly selected from the relevant image database. We used 5-fold approach for training and testing the data. The comparison of the proposed method and other methods presented in . is illustrated in Table 3. As we see, in the proposed approach not only the stegano and extracted images have better quality, but also it has much more robustness compared to the detection algorithms. The low robustness of two mentioned methods is due to the replacement of the error block regardless of the statistical model of high frequency wavelet coefficients and this issue has caused their algorithm to be vulnerable of We have performed the same experiment for comparing our proposed method with the work done in . In this method, a suitable algorithm was applied for extracting cover image. We also used this algorithm . for selecting the cover image, however, with assuming that the applied feature is 4y4 blocks of approximation coefficients of contourlet transform in database of the cover images. The results of this experiment are shown in Table 4. As could be seen, the quality of the stegano image in the proposed method is much better and has more robustness against to the detection algorithms. In this experiment we set Errormax=500 and =4. Table 3. Detection accuracy of H Farid detection algorithm in the proposed method andMasaebe et al. approach and AAbdelwahab et al. approach Average PSNR of stego Image False positive Detection Accuracy Average PSNR of extracted secret Image The proposed method Masaebe et al. method AAbdelwahab et al. method Table 4. Detection accuracy of H Farid detection algorithm in Sajedi et al. approaches and the proposed The proposed Sajedi et al. Detection Accuracy False Average PSNR of stego Image Average PSNR of extracted secret Image In the second experiment, a number of standard images with the size of 256 x 256 are selected as the the cover image and the redfort image is selected with the size of 128 y128 as the secret image. In the Table IJECE Vol. No. April 2013: 207Ae214 IJECE ISSN: 2088-87 5, thee PSNR of thee stegano imaage for the prooposed algoriithm and pressented algorithhms in . ] could be As could cleaarly be seen inn the Table 5, the quality off the stegano images in the proposed algo orithm are signifficantly higherr than the otheers. The outpuut of the propo osed algorithm m is illustratedd in the Figuree 7. In this experiment bydecreeasing Errormax 1, we improveddthe qualityoff extracted seccret image m respect to experiment and decreased the quality of the stegano imagge. However, as a can be seenn the quality oof the estegano o image is remaiined predominnant incomaprrision with othher methods. I this experim ment we set Erormax=400 an nd =4. Tabble 5. Comparison between AAbdelwahaab et al. ,Maasaebe et al. Sajedi et aal. and the proposed in term ms of PSNR ussing redfort . * . as the t secret imaage. Cover imaage size is 256 6*256 Pepers Lena Goldhill Boat Prooposed method AAbdelwaahab et al. meethod [Masaeebe et al. [Sajeddi et al. Figure 3. secret im . steg gano image . d extracted secret image In the nexxt experiment, we examinedd the robustness of the propposed techniquue respect to the t attacks mpression, ettc. As mentioned before, by increasinng the factorr and also reducing such as JPEG com , the robustness of the proposedd algorithm co ould be increaased. In this ccase, the stegaano image qualitty is reduced. Here, by considering optim mal values forr these two paarameters, we show that thee proposed algoriithm has an appropriate roobustness resppect to Gaussiian noise, histogram equallization. Gausian Blur, ma correction, a median filteer and JPEG compression In thiss experiment w we set Errormaxx=200 and =4. By decreasinng Errormaxrespect to experiiments 1 and 2, we increassed robustness against to attacks. could be seen in the t Table 6, regarding to various attaccks, acceptablle PSNR valuues are obtained using propoosed algorithm m which is ann indicator of the acceptablle quality of extracted secrret image afteer relevant As we findd from Table 6, the acceptaable amounts of PSNR is obtained by thhe core of thee different attackks for the propposed algorithhm that these amounts are in ndicators of thhe acceptable quality of thee extracted secrett image after the t exertion off the related atacks. A Robust Steganograpphy Method ussing Adjustablle Parameterss (Ahmad R. Eskandar. A ISSN:2088-8708 Table 6. PSNR of stegano and extracted secret images under different image processing attacks . ecret image size is 128 x 128 and cover image size is 256 * . Image Stegano-Peppers Extract-Redfort Stegano-Lena Extracted Airplane Stegano- Truck Extract- Einstein Stegano- goldhill Extract- clock PSNR JPEG Gaussian Histogram Equalization Gaussian Blur Gamma Median filter CONCLUSION A new approach of steganography based on contourlet transform is proposed in this work. The process is such that the high frequency coefficient of stegano image is far fewer distorted after embedding. This leads to better quality of stegano image and extracted secret image. Meanwhile, the robustness against to detection is increased significantly. Furthermore, we proposed to use two adjustable parameters by witch the efficiency of the embedding can be increased in terms of robustness and quality. We also proposed to use Oe instead of Eucledian distance. The simulation results indicate the effectiveness of the proposed method. Finally. Although our proposed technique is based on countorlet transform, one can use it on other transform domains like wavelet transform. REFERENCES