arxiv: v1 [cs.mm] 17 Mar 2015

Similar documents
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Safer data transmission using Steganography

Friendly Medical Image Sharing Scheme

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Triple Security of Information Using Stegnography and Cryptography

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Solutions to Problem Set 1

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Data Storage 3.1. Foundations of Computer Science Cengage Learning

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

A Concept of Digital Picture Envelope for Internet Communication

Hill s Cipher: Linear Algebra in Cryptography

A comprehensive survey on various ETC techniques for secure Data transmission

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Combating Anti-forensics of Jpeg Compression

Multi-factor Authentication in Banking Sector

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Image Authentication Scheme using Digital Signature and Digital Watermarking

An Application of Visual Cryptography To Financial Documents

encoding compression encryption

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Cryptography and Network Security

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

Symmetric Key cryptosystem

Secure Network Communication Based on Text-to-Image Encryption

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

Cryptography and Network Security Block Cipher

Multimedia Document Authentication using On-line Signatures as Watermarks

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Technical Points about Adaptive Steganography by Oracle (ASO)

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Data Hiding: Current Status and Key Issues

Lecture 9 - Message Authentication Codes

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

The New Approach of Quantum Cryptography in Network Security

JPEG Image Compression by Using DCT

FCE: A Fast Content Expression for Server-based Computing

Simple Encryption/Decryption Application

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

A Novel Security Scheme for Secret Data using Cryptography and Steganography

Enhancing privacy with quantum networks

Network Security: Cryptography CS/SS G513 S.K. Sahay

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Overview of Symmetric Encryption

Online Voting System Using Three Factor Authentication

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Distributing, Ensuring and Recovery of Data Stored in Cloud

Hamid.A.Jalab, A.A Zaidan and B.B Zaidan

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

Secure Physical-layer Key Generation Protocol and Key Encoding in Wireless Communications

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.

Matt Cabot Rory Taca QR CODES

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

A Study of New Trends in Blowfish Algorithm

WATERMARKING FOR IMAGE AUTHENTICATION

Reversible Data Hiding for Security Applications

Security in Offloading Computations in Mobile Systems Using Cloud Computing

Opposites are all around us. If you move forward two spaces in a board game

Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Introduction to Encryption

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

How To Ensure Correctness Of Data In The Cloud

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

The Mathematics of the RSA Public-Key Cryptosystem

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

IT Networks & Security CERT Luncheon Series: Cryptography

How To Encrypt With A 64 Bit Block Cipher

How To Filter Spam Image From A Picture By Color Or Color

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Practice Questions. CS161 Computer Security, Fall 2008

Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization

International ejournals

ECE 842 Report Implementation of Elliptic Curve Cryptography

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Transcription:

arxiv:3.04958v1 [cs.mm] 17 Mar 2015 The blind detection for palette image watermarking without changing the color V.N. Gorbachev, E.M. Kaynarova, I.K. Metelev, O.V. Pavlovskaya North-Western Institute of Printing St.-Petersburg State University of Technology and Design Abstract To hide a binary pattern in the palette image a steganographic scheme with blind detection is considered. The embedding algorithm uses the Lehmer code by palette color permutations for which the cover image palette is generally required. The found transformation between the palette and RGB images allows to extract the hidden data without any cover work. 1 Introduction Palette or indexed images are widespread in the Internet and various steganographic techniques have been developed to protect them. Graphic formats store the palette image creating a data set and a palette array which can be used for hiding the information. The modification of data set or palette as LSBembedding often introduces noticeable artifacts. The possible solutions include sorting palette, parity and adaptive embedding [1] and others [2]. Numerous techniques are based on the fact that reordering the palette colors and reindexing the data set can leave the image visibility unchanged. The GIF- Shuffle steganography program implements this solution for GIF images [3]. The GIF-Shuffle encodes message using the palette color permutations and uses an algorithm that generates permutation according to a given integer. In the same manner SteganoGifPaletteOrder uses permutations of colors in the GIF palette [4]. Together with color images such technique, known as GIF-it- Up, allows to hide information in grayscale GIF images [5]. Encoding by permutation also known as Lehmer code [6] assumes a choice of initial ordering. For instance, the GIF-Shuffle program sorts the palette RGB colors of the GIF using a natural order, i.e. every color is assigned to the value 6536R + 256G + B and then sorted accordingly. It means that to retrieve the hidden information it needs this natural order or in other words E-mail: helenkainarova@gmail.com

Lehmer code 2 it needs the cover work. From this point of view the steganographic system used the permutation code would have not blind detection. This is not a fatal restriction. Such natural order may be considered as a secrete key. The key can be distributed among the legitimate users via numerous classic cryptographic protocols and via a quantum protocol such as BB84 [7]. In this paper we propose a scheme with blind detection. The reason is that the cover image may be generated from the palette stego image if it will could be transformed into its RGB representation. That is possible thanks to the particular transformation between the palette and the RGB images. The main aim of our paper is to consider this map and to discuss the embedding of a binary pattern using the Lehmer code. To improve the security level the GIF-Shuffle and the SteganoGifPalette- Order techniques propose encryption. A possible encryption algorithm may be the ICE (Information Concealment Engine) with a 64 bit key [8]. Indeed, to hide binary images a Vernam cipher may be suitable. When the key is implemented by a random binary matrix a one-time pad can be built. This is a perfect encryption if it is used correctly [9]. On practice one-time pad application is limited, it needs storing and distributing a large random key, that is very expansive. However its modern implementation based on the optical beam splitter of random structure may be efficient [10]. The paper is organized as follows: at first the Lehmer code is briefly discussed, then transformations of palette images are considered and finally a steganographic scheme with blind detection is described. 2 Lehmer code The Lehmer code enumerates permutations by an integer represented in the factorial number system. It allows encoding the binary message by a permutation and it needs an initial permutation called identity. Positive integer m can be represented with the help of the factorial number system as m = n a k (k 1)!, (1) k=1 where factorial digits a k = m/(k 1)! mod (k) take their value from the set 0, 1, 2,... k 1, and the floor function x computes the largest integer less or equal to x. The representation (1) can be considered as a factorial n-digital register, that stores any integer from the range [0, n! 1]. For example, six factorial digits of 251 from a 6 to a 1 read 251 = (2, 0, 2, 0, 1, 0)! = 2 5! + 0 4! + 2 3! + 0 2! + 1 1! + 0 0!. (2) The Lehmer code is one of the ways of encoding permutations using the inversion. Items x k and x j of a permutation are called in the inversion if x k > x j for

Transformation between palette and color images 3 k < j. Let t k be the number of all inversions of x k, then vector t = (t n, t 2,... t 1 ) can uniquely describe any permutation of n entries. As there are n k items to the right from x k, then x k creates no more than n k inversions and t k can take its value 0, 1, 2... n k, where 0 denotes no inversion and max t k = n k. For example, assume the permutation of n = 6 entries be P (012345) = 204153, where 012345 is the identity permutation. Then max t = (5, 4, 3, 2, 1, 0), where 0 indicates the fact that the item 5 is the last and there are no items on its right. For this case P (012345) = 2 0 4 1 5 3 t = (2, 0, 2, 0, 1, 0), (3) where the first item 2 from t indicates that the first item of permutation 2 creates inversions with 0 and 1. The considered examples (2) and (3) illustrate the one-to-one correspondence between the permutation presented by its inversions and the integer m presented by its factorial digits 251 = (2, 0, 2, 0, 1, 0)! 204153. Another example is the permutation of max t = (n 1,..., 2, 1, 0) that refers to full inversion of its entries P inv (012... n 1) = n 1... 210 n! 1 = (n 1,..., 2, 1, 0)! n 1... 210. (4) The Lehmer code allows to encode any digital images using permutations. For instance, considering a binary image, this is a set of binary digits of an integer m that can be represented in the factorial number system. Figure (1) illustrates first steps. A 41 41 binary image of two colors (red and black) is transformed into an integer m that consists of 3 decimal and 256 factorial digits. Factorial digits are arranged into the 16 16 matrix shown in the Fig. (1) (d). Then to generate the desired permutation for the given m an identity permutation has to be selected. This fact is important for the palette color embedding techniques based on the color permutation. For this case the identity permutation is given by the cover palette and it is required for detection of hidden data. As result the detection algorithm will use the cover image and will not be blind. However the cover palette can be achieved from a stego image thanks to particular features of the palette color transformation. 3 Transformation between palette and color images A palette image can be converted into another one so that both images will have the same RGB appearance that can be converted reversibly only to one of them.

Steganographic scheme with blind detection 4 From the mathematical point of view a palette or indexed image can be represented by a tensor product C pal = I P, where I is a data set or an index array, and P is a palette that maps the color in RGB model. When index i I refers to the palette it takes the color and then there is a transformation C pal C rgb, where C rgb is an RGB representation of the palette image or its appearance we see on the display. A common transformation between color and palette images is irreversible. The usual representation has 24 bit for color pixel and 8 bit for palette pixel. A large number of color quantization algorithms allows us to convert a 24-bit color image into a palette image of 8 bit color - C pal (8). Here the entropy is not preserved and this transformation is lossy, however the achieved palette image may look nice. Let the image C pal (8) have its RGB appearance of 8 bit color C rgb (8). Using the same color quantization algorithms we convert this RGB image back into the palette one. The algorithms are assumed to be deterministic then clear that output is C ind (8). It means that there is the one-to-one correspondence between C rgb (8) and C ind (8): C rgb C ind. (5) Indeed, this reversible transformation can not couple all pairs of images and there is a set of palette images for which (5) is not reversible. Palette images can be transformed from one to another using different approaches. A simultaneous changing of the index and the palette colors may result in a transformation C pal S pal, where both palette images have the same RGB appearance C rgb. Let C pal and C rgb be coupled by (5). Then clear that the quantization algorithms convert C rgb into C pal instead of S pal. This observation is described by the next mapping C rgb C pal S pal C rgb. (6) Figure (2) illustrates the map given by (6). Here the RGB color image C rgb and the palette image C pal are converted from one to another by Matlab functions rgb2ind and ind2rgb in accordance with Eq (5). Two palette images are given by its index arrays, grayscale patterns and palettes. The image S pal is a negative of C pal. The negative is achieved by replacing the indexes and the palette colors or the palette rows with i i = 255 i. Being negative patterns both images C pal and S pal have the same RGB representation given by C rgb. 4 Steganographic scheme with blind detection Two palette images that have the same RGB appearance may be considered as a pair of cover and stego works of a steganographic scheme where the hidden message can be extracted from the stego image. Two palette images shown in the Fig (2) have the same look and one of them - S pal is achieved from C pal by inversion of its colors and indexes. Using this

Acknowledgments 5 approach a message was embedded and it can be established easily. It follows from the Lehmer encoding that the permutation that inverts all n colors has integer m = n! 1 (4). This integer consists of not less than N = log 2 (n!) binary digits and is a message M embedded into the palette. Without loss of generality we will consider M as a binary image. However this image will consist of 1 only and its Shannon entropy H(M) = 0. For a palette of n = 256 colors N 1684 and being accurate up to 3 bits we find that M is a 41 41 matrix of 1 that may look as a black square. It means that embedding the message as a "black square is a complete inversion of the palette colors. Fig. (3) illustrates embedding a binary image by the Lehmer code. The 41 41 binary image presented in the Fig. (1) (a) is embedded into the cover work C pal in the Fig. (2) (b). The stego image S pal is shown in the Fig. (3) (b), and is achieved by the found permutation of the palette colors and indexes of C pal. A piece of the permutation is given at the button, in the Fig. (2) (c). After the message is embedded the stego image S pal can be storied in such graphic formats as GIF and PNG for further use without any lossy transformations. To extract the message from S pal it should be downloaded from GIF or PNG and in accordance to (6) the solution is obtained after executing the following steps: palette is extracted from S pal and cover image C pal is generated from C rgb that is the color representation of both the stego and the cover images; palette is extracted from C pal that is the identity permutation of colors; the hidden message is extracted from the the palettes by Lehmer encoding. Note that the presented scheme is not secrete from the Kerckhoff s principal point of view because it has no secrete key. A possible solution is to generate a random binary matrix of the size equal to the binary message and combine them, for example, by modular addition. When the matrix is random and is never reused the obtained system (known also as a one-time pad) is unbreakable. 5 Acknowledgments We are grateful to Volker Jansen for attention to our work. One of the authors (E.M.K.) was supported by DAAD (German Academic Exchange), under grant No 11.9170.2014. References [1] J. Fridrich, R. Dui. Secure steganographic methods for palette images. In 3rd Information Hidding Workshop, Lecture note on computer science (1768), New York, Heidelberg, 1999, Spriger-Verlag. R. Machado. EZ Stego, Stego Online, Stego, http://www.stego.com, 3. 1

REFERENCES 6 [2] C-C Chang, C-C Lin, Y-H Chen. Hiding data in colour palette images with hybrid strategies, The Imaging Science Journal, Volume 57, Issue 1 (01 February 9), pp. 19-29. 1 [3] http://www.darkside.com.au/gifshuffle/ 1 [4] http://users.skynet.be/glu/sgpo.htm 1 [5] http//www.theargon.com/achilles/steganography/gif-it-up/ Shiguo Lian, Yan Zhang. Handbook of Research on Secure Multimedia Distribution. IGI Global, 2011. 1 [6] D. H. Lehmer, Teaching combinatorial tricks to a computer, Proc. Sympos. Appl. Math. Combinatorial Analysis, Vol. 10, Amer. Math. Soc., Providence, R. I., 179-193, (1960). 1 [7] C.H. Bennett, G. Brassard. Quantum public key distribution system. IBM Tech. Discl. Bull. 28, 3153-3163 (1985). 2 [8] http://www.darkside.com.au/ice/index.html 2 [9] C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal 28 (4), 656715 (1949). 2 [10] R. Horstmeyer, B. Judkewitz, I. Vellekoop, S. Assawaworrarit and C. Yang. Physical key-protected one-time pad. arxiv: 1305.3886v2 [physics.optics] 26 Nov 2013, (2013). 2

REFERENCES 7 (a) m=(0, 0, 2, 2, 2, 0, 6, 2, 8, 5, 2, 2, 0, 9, 8, 1, 11, 6, 11, 16, 18, 8, 10, 20, 2, 17, 11, 19, 8, 11, 5, 14, 24, 15, 21, 32, 16, 13, 10, 34, 35, 38, 36, 28, 27, 4, 1, 17, 30, 34, 23, 35, 43, 25, 14, 52, 15, 47, 27, 45, 28, 2, 33, 16, 31, 4, 59, 56, 65, 67, 8, 44, 69, 48, 52, 74, 43, 58, 18, 51, 63, 10, 79, 59, 65, 24, 64, 44, 54, 43, 7, 74, 23, 86, 45, 72, 30, 77, 61, 94, 6, 83, 83, 4, 92, 40, 18, 61, 105, 104, 17, 57, 64, 38, 74, 36, 41, 8, 31, 10, 14, 37, 62, 80, 42, 112, 97, 86,, 105, 89, 28, 3, 60, 35, 7, 25, 122, 126, 126, 105, 27, 77, 126, 55, 132, 93, 31, 4, 17, 78, 20, 93, 145, 81, 31, 126, 22, 143, 118, 19, 126, 103, 60, 60, 66, 159, 157, 64, 53, 70, 76, 8, 152, 66, 123, 128, 121, 2, 128, 20, 102, 115, 82, 179,, 38, 97, 188, 173, 68, 11, 49, 127, 97, 44, 32, 180, 54, 106, 91, 159, 32, 107, 30, 196, 92, 132, 17, 188, 189, 11, 67, 80, 152, 135, 148, 66, 87, 169, 180, 68, 159, 101, 179, 63, 122, 142, 197, 32, 229, 52, 230, 51, 51, 22, 234, 14, 206, 227, 174, 71, 73, 196, 243, 68, 28, 65, 199, 39, 163, 71, 232, 252, 4, 0)! (c) m=6564698395969575619217434227940305226292 75144187068314667223276003872109960051332 924178256625909459088476119690805818012 0096364808627684263408848496245696944880585 28223585534001405291968405934357397259482 9057605847681238359717540871047266719162039 91245407585476705668698314062403095642606 1068740462944214526222832557674567028272210 58999922457074963411934271957089344914320 8488338037418189084529131131099129182833940 16720617777589057610668489547334076872848 089933610177648795478168370151424.0 2 4 6 8 10 12 14 16 (b) (d) 5 10 15 0 Figure 1: Encoding of binary image by the factorial digits of the integer: binary image of 41 41 pixels (a); the 3 digital integer corresponding to the binary image (b); the 256 factorial digits of the integer m (c); the 16 16 matrix representing the factorial digits (d). W

REFERENCES 8 Cpal 300 Crgb Spal 400 0 600 300 400 0 600 700 800 (a) Cpal (b) 300 400 0 600 300 400 0 600 700 800 (c) Crgb Spal (d) Figure 2: Transformations between the color and palette images (a); palette image C pal and its negative S pal presented by its data sets, grayscale images, and palettes (b) and (d); these palette images have the same RGB appearance C rgb (c). W

REFERENCES 9 0.5 1 1.5 (a) 0.5 1 1.5 Spal (b) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 0 5 254 234 73 166 41 204 68 30 74 253 205 80 78 184 241 219 16 251 25 57 58 60 252 (c) Figure 3: Embedding of binary image by the Lehmer code. Binary image and cover work shown in the Fig. (2) (b) and in the Fig. (1) (a). The cover image palette (a); palette stego image achieved by permutation of the colors and indexes (b); a piece of the permutation (c). W