International Journal of Electrical and Computer Engineering (IJECE) Vol. No. February 2019, pp. ISSN: 2088-8708. DOI: 10. 11591/ijece. A secure image steganography based on burrows wheeler transform and dynamic bit embedding Ahmed Toman Thahab Department of Electrical and Electronic Engineering. University of Kerbala. Iraq Article Info ABSTRACT Article history: In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence. In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods. Received Jan 11, 2018 Revised Oct 10, 2018 Accepted Oct 27, 2018 Keywords: Burrows wheeler transform dynamic embedding Data security Payload XOR Copyright A 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ahmed T. Thahab. Department of Electrical and Electronic Engineering. University of Kerbala. 104 Al-Mwathafeen Road. Kerbala Province. Iraq. Email: toeahmed@gmail. INTRODUCTION A technique that conceals secret information inside another variety of information data is termed as steganography . It is broadly used nowadays in information security strategies over the last decade since this kind of invisible communication prevents imperrmissible access to secret information . Although other data security strategies such as cryptography and encryption techniques exist for secure data transmission, steganography uses files such as audio, image, video formats to transmit data oblivious to the fact that data exits in the message . Watermarking is also considered as a hiding technique, but it is used to protect copyright of content such as small tags or company logos. Steganography conceals greater payload in cover media . Essentially, any stenographic system consists of three major components: The cover file where information is hidden. the secret file and the stego-file which is considered as the output resultant from the When embedding secret message data in a cover media, it ought to be visually undetectable and the output stego-file should not possess any noticeable adaptation compared to the original cover image . Imperceptibility is crucial factor when it comes to steganography techniques. it reflects the level of correlation between the stego and the cover file. Moreover. other factors such as security and capacity are also considered decisive factors for steganography algorithm. Steganography has been under the scope of researcher for some time since. it is a vital field for covert communication. Secret information can be embedded in the spatial domain specifically in the pixel intensity value . A pioneering embedding method used in steganography is the least significant bit technique (LSB). This technique utilizes the least significant bits of a code-word and replaces them with the most significant bits of the secret binary data. In . , a new LSB technique is proposed using differencing. Journal homepage: http://iaescore. com/journals/index. php/IJECE Int J Elec & Comp Eng ISSN: 2088-8708 The method takes the difference between bit No. 5 and bit No. 6 to hide secret message. If the result of difference is not equal to the secret information bit the bit no. 5 is transverse. Results of this method show a peak signal to noise ratio (PSNR) of 51. 1803 with payload of 262144 bits. The main disadvantage of method in . and generally LSB substitution is the techniquesAo tolerance in terms of security and capacity . , . , it has been combined with other techniques such as encryption and source coding etc. Authors in . encoded the secret data using Huffman encoding method and embed the encoded secret data in the cover image using LSB method. Although the technique achieved a PSNR of 57. 43dB, the embedding capacity of the technique used is 25% of the cover image size. Huffman encoding requires a Huffman table to be known at the receiver side to decode the secret data. Processing time is also a critical factor in the performance of this algorithm. Other authors used encryption to decrease the chances of data security compromise. In . , an improved version of least significant bit (LSB) method is proposed using The secret data embedding positions are encrypted using a secret encryption key. The maximum stego file quality (PSNR) is 53. 7869dB without mentioning the embedding capacity of the algorithm. For LSB to have more security features, authors in . utilized a Ron Code (RC. to randomize the concealment of secret data bits in the cover image instead of LSB conventional sequent embedding manner. The complexity of the algorithm and its time processing consumption are disadvantageous to the proposed Signal transform tools such as discrete wavelet transform (DWT) is utilized in steganography to increase embedding capacity without degenerating visual quality. Lately, numerous researches have been founded on discrete wavelet transform (DWT), since the transform provides a vital frequency band localization suitable for data embedding. In . , authors proposed a steganography method using encryption technique and DWT. The DWT is applied on the cover image. Redundancy in the cover image is determined using threshold calculation based on the image statistics. The secret message is partitioned and encrypted using RC4 algorithm. A DWT is also applied to the encrypted secret message. The embedding process implies a simple replacement of DWT coefficients of the encrypted secret message in the previously specified DWT of the cover image. Although this method is secure, it requires hard ware resources such as processor speed and memory. Although frequency domain embedding is considered a secure embedding domain, the extracted secret data will suffer some degradation from the forward and reverse transform LSB spatial embeding is considered as fragile hiding technique in terms of security, therefore it requires a combination with encryption techniques as in . but, these techniques require additional processing and computational expensive. Manipulating the embedding procedure will provide a massive security feature to the steganography algorithm. In this paper a new embedding procedure is developed for hiding secret data inside a cover media utilizing the Burrows Wheeler transform (BWT) for manipulating the sequence of data embedding inside the cover media according to the output of BWT. The embedding procedure is based on an exclusiveAeor (XOR) operation between a virtual bit and the LSB of the cover pixel The rest of the paper organized as follows: Section two explains the conventional LSB method. Section three presents the steps of Burrows wheeler transform. Section four illustrates the embedding and extraction method Section five gives the results of some tests for the proposed steganography algorithm and comparison with other algorithms. Section six states the conclusions and future developments. CONVENTIONAL LEAST SIGNIFICANT BIT The least significant bit technique is considered as a simple method used in the steganography field. If a secret message is considered as a binary bit stream it can be embedded into a cover media, . Audio, image, and vide. by replacing the LSB bits of the cover image with the secret bits . The number of replaced bits depends on the method that is utilized in the algorithm. Suppose an image of an 8 bit grayscale have the following two pixel binary values p1=. and p2=. and the secret message that is required to be embedded is S=. in the pixels, the stego output pixels are S1=. and S2=. The error between . 1, p. and the [S1. is imperceptible to the human visual system (HVS). Increasing embedding capacity requires embedding more bits into the right side of the cover stream However, increasing the embedding capacity results in a quality degrade of stego image. Therefore. trade-off between embedding payload and quality of stego image ought to be considerable. Although this method is considered simple and fast, its main drawbacks are limited capacity and vulnerable security. A secure image steganography based on burrows wheeler transformA (Ahmed Toman Thaha. A ISSN: 2088-8708 BURROWS WHEELER TRANSFORM Lossless data compression is a technique used to compress data by manipulating data in a form that can be reversed to retrieve its original value without losing any vital data . The Burrows wheeler transform (BWT) is a technique based on block sorting which blocks of data are manipulated to be transformed to an easier form for processing. Since the technique is used in many practical applications especially in lossless compression techniques, there have been many extensions of the original BWT . Data can be transformed in the BWT domain and vice versa. The forward burrows wheeler transform The BWT is reversible transformation, therefore. original data is reconstructed to its original form. In order to transform the data using BWT, the output of the transformation is limited to two factors. output (B), and the index . where the location of the original input is located . , . Consider a one dimension pixel sequence P=. 2 5 3 . The sequence . is copied to a two column table (Index and sequenc. as shown in Table 1. The index . AAn-. where n: is number of values in pixel. The sequence is then left-cyclic permutated into each consequent index row. The rows are then sorted lexicographically as in Table 2. Table 1. Shows the Left Cyclic Permutation Inx No. Left Cyclic Permutation Sequences Table 2. Shows the Lexicographically Sorted Rows Inx No. Left Cyclic Permutation Sequences The search for the input one dimension row is executed in Table 2 and which the original pixel is In this example the original row is indexed at 3. The BWT (B) for the input pixel p=. 2 5 3 . is the last column B=. 3 5 1 . and inx=3. The proposed algorithm utilizes the transform to randomize the blocks which will be embedded. Since the lexicographical sorting depends on the input vector to the transform, unique outputs will be produced. This technique will blossom the security grade of the method. PROPOSED IMAGE STEGANOGRAPHY In this section, we describe a novel color image steganography. As mentioned in previous section, the main drawbacks of the LSB technique are security compromise and limited embedding capacity. In order to overcome these drawbacks, a new image steganography approach is proposed using generated virtual bit. The method increases the embedding capacity of the conventional LSB without introducing noticeable distortion to the stego-image. The method also possesses security features protecting secret data inside the cover image using Burrows wheeler transform to enhance the embedded data security. Figure 2 shows the block diagram of the method. Figure 2. Block diagram of the proposed hiding algorithm Int J Elec & Comp Eng. Vol. No. February 2019 : 460 - 467 Int J Elec & Comp Eng ISSN: 2088-8708 A RGB image is input to the algorithm, and separated into three layers R. G, and B. Layers of the color image are divided into k*k non-overlapping blocks. Utilizing the Burrows wheeler permits the assign of alphabat codes or decimal numbers to the blocks. In the proposed work, each block is assigned a one decimal For example using a 64*64 block for 128*128 image will have a four . blocks per layer, four decimal codes exist. The decimal numbers representing blocks are converted to a one dimension vector using either Hilbert scanning, raster scanning, zig-zag scanningA. In this paper, the Hillbert scanning path is used since this type of scanner scans every block of any square image size. The one dimension vector is input to the Burrows wheeler transform for randomizing the blockAos sequences to be embedded with secret data, this will increase the security of the secret data since intruders are unaware of the sequence of the blocks, size of blocks, type of the scanner used and type of block asigning. This prior embedding process is considered as first line of defense for the embedded secret data. Blocks of one layer are input to BWT and other two layers are embedded due to the same sequence of the first layer. This will reduce time and complex processing required by BWT. in addition the algorithm does not require the inverse BWT for extracting the data. Hiding secret data The method hides secret data in the spatial domain of a color image without utilizing any signal The embedding method assumes a virtual bit at the least significant bits of each cover image pixel which is generated from a two MSB bit according to . (Vi. = MSB - Oi MSB - where : Vir: virtual bit generated. MSB: the ith most significant bit of cover bit & i=8, 7An. The XOR between the LSB bit and the virtual bit according to . and the result (Re. is compared to the secret data bit. If the result is equal to the data bit, the LSB bit is unchanged. Otherwise change the LSB bit to the difference bit. In this operation one bit is embedded in the ith LSB bit. cIycey. = yaycIyaA Oi ycOycnyc Where: LSB: the ith least significant bit of cover bit. Embedding operation is continued for n bits. If n=8, then only one bit is embedded in the LSB of the cover pixel. If n=7, then two bits are embedded in the cover pixel etc. For an illustration of the procedure for the embedding process. Table 3. shows the embedding procedure for the secret data in the sixth bit of the cover data. The table assumes that the virtual bit is 0. Table 4. shows the illustration for the same embedding process of Table 3. for virtual bit of 1. It is clear from Table 3. and Table 4. that each embedded codeword yields to a unique code word, therefore. a complete extraction of secret data is applicable. Table 3. Shows the Embedding Scheme for Virtual Bit 0 Table 4. Shows the Embedding Scheme for Virtual Bit 1 Embedding Bit 0 No. Cover bits B5 B6 B7 B8 Sec. Stego bits No. Embedding Bit 0 Cover bits Sec. Stego bits B5 B6 B7 B8 A secure image steganography based on burrows wheeler transformA (Ahmed Toman Thaha. A ISSN: 2088-8708 Extracting secret data Most of the steganography algorithms require a lot of keys in order to extract the secret data from the stego image. These keys are either embedded or sent as header information. In addition to keys, other algorithms require knowledge of the cover image to reconstructed secret data. The proposed embedding algorithm does not require the cover image to extract secret data making the algorithm as a blind steganography algorithm and keys required are block sizes of the segmentation . of image and the number of bits embedded per pixel . Figure 3 shows the secret extraction block diagram. Figure 3. Block diagram secret data extraction The stego image is separated into R. G and B layers. Each layer is divided into . blocks and have the same assignment and type of scanner. The burrows wheeler transform is applied to find the embedding sequence of the blocks. The extraction of the ith bit from the stego pixel is according to . cIyceyc ) = ycIycyceyci Oi ycOycnyc Steg: the ith least significant bit of steg bit. If the Res is equal to the ith bit of the stego, the secret bit is ycIyceyc . Otherwise: secret bit is the inversion of the ith bit. The blindness proposed method can extract the secret data without creating errors. RESULT AND DISCUSSION The basic performance of any stenographic algorithm is the stego-image quality and the embedding capacity that the algorithm provides to carry secret data. The stego quality is gauged using the image metric peak signal to noise ratio (PSNR) which is given by . & . for a square image. Some authors determine the PSNR for each layer of the color image. therefore, the quality metric (PSNR) will be averaged over the three layers: ycEycIycAycI = 10 ycoycuyci ycAycIya = Oc Oc . oyco Oe ycnyc. where: m and im are the stego and cover pixels respectively. N: is the number of pixels in row or column of a square image. A superior image steganography algorithm performance is remarked when the algorithm achieves a high PSNR and embedding capacity. Moreover, the vital issue on message recovery side is the errorless message retrieval from the cover media. The proposed algorithm is assessed with four images with various number of embedding bits. The size of the image is 256*256*3 and 512*512*3 color images. Figure 4 shows the original images of Baboon and Lena. Other image metric such as normalized cross correlation (NCC) is Int J Elec & Comp Eng. Vol. No. February 2019 : 460 - 467 Int J Elec & Comp Eng ISSN: 2088-8708 utilized to illustrate the high correlation presented between the stego-image. The calculation of NCC for a square image is given in . 1 N N E ^ NCC A 2 EuEu E imA im E N I A1 J A1 E As stated in section 4, the image is segmented into k*k blocks since the input images are a size of 512*512 then k=64, therefore. there will be 64 blocks of 64*64. All blocks will be assigned decimal codes and converted to a one dimension block using Hilbert scanning. The one dimension code vector is randomized according to Burrows wheeler transform. The algorithm will embed one bit . and two bits . in the cover image. Table 5 illustrates the PSNR for various bit embedding payloads. The secret data stream is generated by a psedu-random generator. Table 5. Stego Image Quality versus Payload Covers Images Image Name and size Babbon 512*512*3 Lena 512*512*3 Viptraffic 128*128*3 Tajmahal 256*256*3 Kola 256*256*3 Number of bits Payload in bits original Baboon and lena PSNR in dB NCC Stego image Baboon and lena Figure 4. Shows the original and stego color 512*512 Baboon and Lena images With many experiments made on other various images the range of PSNR for present technique is 12 dB. When three bits are embedded in a cover pixel, the PSNR is in the range of 40-35dB with payload 2359296 bits. Embedding more bits in the cover image will degrade the quality of the image with respect to the original image. Stego images shown in Figure 4. are highly correlated to the original images compared with the originals. Therefore, the algorithm preserves image quality for high payloads and is highly secure for data embedding. The proposed algorithm compared with other proposed algorithms in . is less complex, in addition to the required processing time. However, the method presents better PSNR and high capacity embedding. Table 6 and Table 7 show the comparison between these techniques respectively. Table 6. Comparison of Stego Image Quality and Payload for 256*256 Image Image Lena Baboon Tagmahal Kola Reference . APSNR in dB Payload in bits Proposed Method n=8 PSNR in dB Payload in bits A secure image steganography based on burrows wheeler transformA (Ahmed Toman Thaha. A ISSN: 2088-8708 Table 7. Comparison of Stego Image Quality and Payload for 512*512 Image Image Lena Baboon Sailboat Paper Reference . PSNR in dB Payload in bits Proposed Method n=8 PSNR in dB Payloadin bits CONCLUSION AND FUTURE WORK The essential objective of a steganography algorithm is to address the security of information which is achieved by concealing secret communication data inside the cover media. It is crucial for the sender to conceal high amount of secret information inside a cover media and send the information over a public communication channel. However, intruders can pirate the information inside the cover media unless the stego image is highly correlated to the original media. A novel image steganography method is proposed in this paper utilizing the XOR function with generated virtual bits and a pre-embedding method based on Burrows wheeler transform. The proposed steganography method highly complies with steganography objectives. Embedding the secret data using the proposed embedding strategy produces a stego image highly correlated to the original cover, since the strategy saves the deference of the result of the XOR function. The virtual bit generated from the MSB binary cover pixel is neither affected by the noise added on the stego-image nor other compression process, therefore. the method permits a complete reconstruction of the secret data. Burrows Wheeler transform sorts either decimal number coded blocks or alphabat chericteristecs codes that are sorted Therefore. the assigned coded blocks of the cover image is redistributed in a random manner before embedding. The procedure enhances security of embedding data. The proposed algorithm can be enhanced using the output of digital scramblers for assigning the codes of cover image blocks since the output of the digital scramblers alters with the number of shift registers, the initial digital bit value memorized inside the shift registers and their arrangments. Nevertheless, the algorithm can be utilized in hiding images inside a cover video. REFERENCES