بهبود امنیت روش پنهاننگاری LSBM با استفاده از الگوریتم ژنتیک، چندکلیدی و بلاکبندی
محورهای موضوعی : مهندسی برق و کامپیوتروجیهه ثابتی 1 * , سپیده فیاضی 2 , حدیثه شیرین خواه 3
1 - دانشگاه الزهرا
2 - دانشگاه الزهرا
3 - دانشگاه الزهرا
کلید واژه: الگوریتم ژنتیکپنهانشکنیپنهاننگاریروش LSBM,
چکیده مقاله :
با افزایش دقت حملات پنهانشکنی در کشف روشهای پنهاننگاری، نیاز به بهبود امنیت روشهای پنهاننگاری بیشتر از گذشته احساس میشود. LSBM یکی از روشهای ساده پنهاننگاری است که حملات نسبتاً موفقی برای کشف آن تا به حال ارائه شده است. هدف اصلی در این مقاله ارائه روشی برای بهبود LSBM است. انتخاب دنباله پیکسلها برای جاسازی و چگونگی تغییر مقدار آنها در روشهای مبتنی بر LSBM متفاوت هستند. در اغلب روشهای موجود بعضی از این تصمیمات به صورت تصادفی گرفته میشود. در روش پیشنهادی در این مقاله، در مرحله اول از ایده چندکلیدی و در مرحله دوم از الگوریتم ژنتیک استفاده شده است تا تصمیمات بهتری اتخاذ شود. در روش پیشنهادی با عنوان MKGM، تصویر پوشش بلاکبندی شده و برای هر بلاک با چند کلید مختلف روش GLSBM اجرا میشود و در انتها بلاکی که کمترین تغییر هیستوگرام را نسبت به بلاک اولیه داشته باشد، در تصویر استگو قرار میگیرد. روش GLSBM، همان روش LSBM است با این تفاوت که برای تصمیمگیری در مورد افزایش یا کاهش پیکسلهای غیر مطابق، از الگوریتم ژنتیک استفاده میشود. مقایسه معیارهای کیفیت تصویر و دقت حملات در کشف روش پیشنهادی، نشاندهنده بهبود این معیارها در مقایسه با روش LSBM اصلی است.
By increasing the precision of steganalysis attacks in discovering methods of steganography, the need to improve the security of steganographic methods is felt more than ever. The LSBM is one of the simplest methods of steganography, which have been proposed relatively successful attacks for its discovery. The main purpose of this paper is to provide a method for improving security of LSBM. The choice of the sequence of pixels to embed and how to modify them varies in LSBM-based methods. In most existing methods some of these decisions are made at random. In the proposed method in this paper, a multi-key idea in the first step and a genetic algorithm in the second step are used to make better decisions. In the proposed method, as MKGM, the image is blocked and GLSBM is executed for each block with different keys and finally the block with the least histogram change compared to the original block is included in the stego image. The GLSBM method is the same as the LSBM method except that the genetic algorithm is used to decide whether to increase or decrease non-matching pixels. Comparison of the image quality criteria and the accuracy of the attacks in the detection of the proposed method show that these criteria are improved compared to the original LSBM method.
[1] Y. J. Chanu, T. Tuithung, and K. M. Singh, "A short survey on image steganography and steganalysis techniques," in Proc. IEEE 3rd National Conf. on Emerging Trends and Applications in Computer Science, pp. 52-55, Shillong, India, 30-31 Mar. 2012.
[2] V. Sabeti, S. Samavi, M. Mahdavi, and S. Shirani, "Steganalysis and payload estimation of embedding in pixel differences using neural networks," Pattern Recognition, vol. 43, no. 1, pp. 405-415, Jan. 2010.
[3] M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. Ho, and K. H. Jung, "Image steganography in spatial domain: a survey," Signal Processing: Image Communication, vol. 65, pp. 46-66, Jul. 2018.
[4] J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: techniques, evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, Mar. 2019.
[5] A. Westfeld and A. Pfitzman, "Attacks on steganographic systems," Lecture Notes in Computer Science, vol. 1768, pp. 61-75, Springer, 2000.
[6] J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," Magazine of IEEE Multimedia, vol. 4, no. 8, pp. 22-28, Oct-Dec. 2001.
[7] S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. on Signal Processing, vol. 51, no. 7, pp. 1995-2007, Jul. 2003.
[8] A. Ker and R. Bohme, "Revisiting weighted stego-image steganalysis," Proc. of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 1-17, 27-31 Jan. 2008.
[9] A. Westfeld, "Detecting low embedding rates," in Proc. Int. Workshop on Information Hiding, pp. 324-339, Oct. 2002.
[10] J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 5020, pp. 131-142, Santa Clara, CA, USA, 20-20 Jun. 2003.
[11] A. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, Jun. 2005.
[12] A. Ker, "Resampling and the detection of LSB matching in color bitmaps," in Proc. of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, pp. 1-15, 2005.
[13] J. Zhang, I. J. Cox, and G. Doerr, "Steganalysis for LSB matching in images with high-frequency noise," in Proc. of the IEEE Workshop on Multimedia Signal Processing, pp. 385-388, Crete, Greece, 1-3 Oct. 2007.
[14] G. Cancelli, I. J. Cox, and G. Doerr, "Improved LSB matching steganalysis based on the amplitude of local extrema," in Proc. IEEE Int. Conf. on Image Processing, ICIP’08, Oct. 2008.
[15] F. Huang, B. Li, and J. Huang, "Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels," in Proc. IEEE Int. Conf. on Image Processing, ICIP’07, vol. 1, pp. 401-404, San Antonio, TX, USA, 16-19 Sept. 2007.
[16] M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, San Jose, CA, USA, 2006.
[17] G. Cancelli, G. Doerr, I. J. Cox, and M. Barni, "A comparative study of +1 steganalyzers," in Proc. IEEE Int. Workshop on Multimedia Signal Processing, pp. 791-96, Cairns, Australia, 8-10 Oct. 2008.
[18] N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symp., pp. 323-335, Washington, DC, USA, 13-17 Oct. 2001.
[19] C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, pp. 469-474, 2004.
[20] م. مهدوي، ش. سماوي، م. اخوت و ص. اكرمي، "روش پنهاننگاري تطبيقي بر اساس اغتشاش جمعشونده،" پانزدهمين كنفرانس مهندسي برق ايران، جلد مخابرات، 9 صص.، تهران، ایران، ارديبهشت 1386.
[21] C. Liu, X. Li, X. Lu, and B. Yang, "A content-adaptive approach for reducing embedding impact in steganography," in Proc. of the IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP’10, pp. 1762-1765, Dallas, TX, USA, 14-19 Mar. 2010.
[22] R. Rinita and S. Laha, "Optimization of stego image retaining secret information using Genetic Algorithm with 8-connected PSNR," Procedia Computer Science, vol. 60, pp. 468-477, 2015.
[23] H. R. Kanan and B. Nazeri, "A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm," Expert Systems with Applications, vol. 41, no. 14, pp. 6123-6130, Oct. 2014.
[24] R. Wang, C. Lin, and J. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, Mar. 2001.
[25] P. D. Shah and R. S. Bichkar, "A secure spatial domain image steganography using genetic algorithm and linear congruential generator," in Dash S., Das S., Panigrahi B. (eds) Int. Conf. on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 632. Springer, Singapore, 2018.
[26] D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, Jun. 2003.
[27] V. Sabeti, S. Samavi, and S. Shirani, "An adaptive LSB matching steganography based on octonary complexity measure," Multimedia Tools and Applications, vol. 64, no. 3, pp. 777-793, 2013.
[28] S. Cho, B. H. Cha, M. Gawecki, and C. C. J. Kuo, "Block-based image steganalysis: algorithm and performance evaluation," J. of Visual Communication and Image Representation, vol. 24, no. 7, pp. 846-856, Oct. 2013.