EFFICIENT IMAGE STEGANOGRAPHY APPROACHES BASED ON MIX COLUMN TRANSFORM TECHNIQUE BY WAFAA MUSTAFA ABDUALLAH A thesis submitted in fulfillment of the requirement for the degree of Doctor of Philosophy in Information and Communication Technology Kulliyyah of Information and Communication Technology International Islamic University Malaysia MAY 2015
24
Embed
EFFICIENT IMAGE STEGANOGRAPHY APPROACHES BASED ON …
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
EFFICIENT IMAGE STEGANOGRAPHY APPROACHES
BASED ON MIX COLUMN TRANSFORM TECHNIQUE
BY
WAFAA MUSTAFA ABDUALLAH
A thesis submitted in fulfillment of the requirement for the
degree of Doctor of Philosophy in Information and
Communication Technology
Kulliyyah of Information and
Communication Technology
International Islamic University Malaysia
MAY 2015
ii
ABSTRACT
Steganography is the science of hiding a secret message in cover media, without any
perceptual distortion of the cover media. Using steganography, information can be
hidden in the carrier items such as images, videos, sounds files, text files, while
performing data transmission. In image steganography field, it is a major concern of
the researchers how to improve the capacity of hidden data into host image without
causing any statistically significant modification. In this work, a novel orientation for
data hiding within transform domain of the color images is presented, which is
represented with two schemes: Data Hiding Approach based on Mix Column
Transform (DHAMCT) and Enhanced Data Hiding Approach based on Mix Column
Transform (EDHAMCT). The novelty of these schemes comes from the use of Mix
Column Transform (MCT) technique in image data hiding which is an essential step
of Advanced Encryption Standard (AES) algorithm. These proposed schemes can hide
large amount of information without affecting the imperceptibility aspect of the stego-
image and at the same time, they increase the security level of the system by using
some novel method for embedding based on a distinct type of transform - called Mix
Column Transform. The proposed schemes are based on dividing an image into
blocks, then applying the proposed transform on these blocks and hiding the secret
message within those. The results and comparisons have proven the ability of the
proposed schemes in balancing among the three critical properties for any
steganography system: embedding capacity, security, and imperceptibility.
iii
خلاصة البحثABSTRACT IN ARABIC
دون اي تشويه غطاء لنقل البيانات في رسالة سريةعلم اخفاء المعلومات هو علم اخفاء . باستخدام اخفاء المعلومات فانه من الممكن ان يتم اخفاء المعلومات في انواع لغطاءادراكي ل
مختلفة من النواقل مثل الصور ومقاطع الفيديو والملفات الصوتية والملفات النصية اثناء اداء عملية نقل المعلومات. في مجال اخفاء المعلومات بالصور, فان مسألة تحسين سعة البيانات
صورة المضيفة دون التسبب في اي تغيير احصائي واضح للصورة المضيفة يعتبر المخبأة في المصدر قلق رئيسي لمعظم الباحثين في هذا المجال.توجه جديد لإخفاء البيانات ضمن مجال التحويل للصور الملونة تم تقديمه في هذا العمل متمثلا بطريقتين: نهج اخفاء البيانات على
و تحسين نهج اخفاء البيانات على اساس مزيج تحويل العمود. اساس مزيج تحويل العمود حداثة هاتين الطريقتين تاتي من استخدام تقنية مزيج تحويل العمود في مجال اخفاء البيانات بالصور في حين انها تمثل خطوة اساسية من خطوات خوارزمية التشفير المتقدم . ان هاتين
ء كمية كبيرة من المعلومات بدون التأثير على دقة الصورة الطريقتين المقترحتين بامكانهما اخفاالمخفية وفي الوقت نفسه، فانها تزيد من المستوى الأمني للنظام باستخدام بعض الطرق الجديدة المبنية على اساس نوع مميز من التحويل يدعى مزيج تحويل العمود.اساس الطرق
ومن ثم تطبيق التحويل المقترح على هذه المقترحة يعتمد على تقسيم الصورة الى مجاميع، المجاميع ليتم اخفاء الرسالة السرية فيها. وقد اثبتت النتائج والمقارنات قدرة الطرق المقترحة على تحقيق التوازن بين الخصائص الثلاثة الهامة لأي نظام اخفاء البيانات: سعة التضمين،
الأمنية، والدقة.
iv
APPROVAL PAGE
The dissertation of Wafaa Mustafa Abduallah has been approved by the following:
________________________
Al-Sakib Khan Pathan
Supervisor
________________________
Abdul Monem S. Rahma
Co Supervisor
________________________
Internal Examiner
________________________
External Examiner
________________________
External Examiner
_________________________
Chairman
v
DECLARATION
I hereby declare that this research is the result of my own investigations, except where
otherwise stated. I also declare that it has not been previously or concurrently
submitted as a whole or in part for any other degrees at IIUM or any other institutions.
I hereby affirm that the International Islamic University Malaysia (IIUM) holds all
rights in the copyright of this work and henceforth any reproduction or use in any
form or by means whatsoever is prohibited without the written consent of IIUM. No
part of this unpublished research may be reproduced, stored in a retrieval system, or
transmitted, in any form or by means, electronic, mechanical, photocopying,
recording or otherwise without prior written permission of the copyright holder.
Affirmed by Wafaa Mustafa Abduallah
…………………… ……………………
Signature Date
vii
DEDICATION
I'd like to dedicate this work to:
The memory of my dear and lovely father…
My mother's tears of sadness and her endless tiredness…
My beloved brother and sisters…
All my friends and relatives…
Anyone get benefit from this thesis…
viii
ACKNOWLEDGEMENTS
First of all, thanks to Allah for giving me the strength and confidence to complete this
work and realize my goals.
I would like to express my sincere gratitude to my supervisor, Dr. Al-Sakib
Khan Pathan, for his valuable guidance, In addition to the enthusiastic encouragement
and support he rendered to me in each stage of my research.
I am very grateful to my co-supervisor Prof. Abdul Monem S. Rahma
(University of Technology, Baghdad, Iraq) for his valuable suggestions and
comments.
My sincere gratefulness is to my brother and teacher (Dr. Subhi R. M.
Zeebaree) for his helpful discussions and continuous support during the progress of
the work.
My special thanks to my beloved family for their support, encouragement and
love throughout my life. I am indebted to my dear mother, my lovely brother (Dakhaz)
and my sisters. I couldn’t reach what I have achieved in my life without their
sacrifices.
I would like to thank all my relatives and friends for their continuous support.
Finally, I am thankful to all who taught me, helped me, and criticized me
during achieving this work.
ix
TABLE OF CONTENTS
Abstract .................................................................................................................... ii Abstract in Arabic .................................................................................................... iii Approval Page .......................................................................................................... iv
Declaration ............................................................................................................... v Copyright Page ......................................................................................................... vi
Dedication ................................................................................................................ vii Acknowledgements .................................................................................................. viii
List of Tables ........................................................................................................... xi List of Figures .......................................................................................................... xiii List of Abbreviations ............................................................................................... xv
1.3 Problem Statements ................................................................................ 11 1.4 Objectives ............................................................................................... 13
1.5 Contributions to the Field ....................................................................... 14 1.6 Limitation of the study............................................................................ 15
1.7 Outline of the Thesis ............................................................................... 15
CHAPTER TWO: LITERATURE REVIEW .................................................... 17 2.1 Review of the Past Works....................................................................... 17 2.2 Spatial Domain Techniques .................................................................... 17
2.2.1 The Least Significant Bit .............................................................. 17 A. The Least Significant Bit Replacement: .................................. 18
B. The Least Significant Bit Matching: ........................................ 21 2.2.2 Optimal Pixel Adjustment ............................................................. 23 2.2.3 Pixel Value Differencing: ............................................................. 25
2.2.4 Other Schemes Based On Spatial Domain: ................................... 28 2.3 Transform Domain Techniques: ............................................................. 31
CHAPTER FOUR: RESEARCH METHODOLOGY ...................................... 76 4.1 Introduction............................................................................................. 76 4.2 The Elaboration of the Proposed Mechanism ......................................... 76
4.3 Illustrative Examples .............................................................................. 89 4.3.1 Example of DHAMCT Approach ................................................. 89 4.3.2 Example of EDHAMCT Approach............................................... 93
5.4.1 Implemented Results Using DHAMCT Approach ....................... 103 5.4.2 Implemented Results Using EDHAMCT Approach ..................... 108
5.5 Analysis of Implemented Results ........................................................... 119 5.5.1 Analysis of Implemented Results related to the
Imperceptibility and Capacity ...................................................... 119 5.5.2 Analysis of Implemented Results Related to Security .................. 121 5.5.3 Analysis of Robustness against Well-Known Steganalysis
5.6 Comparison with Other Works ............................................................... 123 5.6.1 Comparison in Terms of Imperceptibility and Capacity ............... 123 5.6.2 Comparison in Terms of Security ................................................. 128
CHAPTER SIX: CONCLUSIONS AND FUTURE DIRECTIONS ................ 131
APPENDIX A EXAMPLE CALCULATION FOR DHAMCT APPROACH ... 144 APPENDIX B EXAMPLE CALCULATION FOR EDHAMCT
APPROACH ................................................................................ 149 APPENDIX C EXAMPLE CALCULATION FOR FINDING INVERSE
MATRIX...................................................................................... 154 APPENDIX D IMPLEMENTED RESULTS OF EDHAMCT APPROACH
USING (3 AND 4) LSB .............................................................. 164 APPENDIX E PUBLICATIONS DURING PHD RESEARCH ......................... 184