Remainder with Threshold Substitution Data Hiding Scheme: Counterexamples and Modification

Authors

Keywords:

Data hiding scheme, Remainder with threshold substitution, Cover Image, Pixel, Secret Embedding, Secret Extraction

Abstract

A well-known data hiding scheme, Remainder with Threshold substitution (RT), is analyzed. RT uses a threshold value, T, and two moduli numbers, m_u, and m_l, m_l<m_u, to embed secret data into a cover image. RT does not impose any divisibility constraints on the selection of the parameters, T, m_u, and m_l, and its correctness (i.e., the data extracted are always the same as the data embedded) is not proved. By counterexamples constructing, we show that RT works for them incorrectly. Also, RT scheme uses pseudo-random number generator (PRNG) to define a pixel for embedding of the next secret bit portion. PRNG can produce repeated values leading to the repeated embedding into the same pixel, thus overwriting previously embedded secret and preventing its correct extraction. We modify RT scheme (by imposing divisibility constraints on the threshold, moduli values, and PRNG), and prove correctness of the modification. Note that in the reported experiments on RT, its parameters used, T=160, and (m_l, m_u) from {(4, 8), (16, 32)}, exactly satisfy our constraints, and, thus, the scheme may be correct for such settings.

Downloads

Download data is not yet available.

Author Biographies

Gürcü Öz, Computer Engineering Department, Eastern Mediterranean University, Famagusta

Alexander G. Chefranov received his Engineer in Applied Mathematics, PhD and Doctor of Engineering Sciences from Taganrog State Radio-Engineering University, Taganrog, Russia. Currently, he is working as Professor in the Department of Computer Engineering of Eastern Mediterranean University. His research interests include information security, parallel processing, distributed systems, real-time systems, scientific computing.

Alexander Chefranov, Eastern Mediterranean University, Famagusta

Gürcü Öz received her B.S, M.S. degrees from the Electrical and Electronic Engineering Department and Ph.D. degree from the Computer Engineering Department of Eastern Mediterranean University, in Famagusta, North Cyprus. Currently, she is working as an Associate Professor in the Department of Computer Engineering of Eastern Mediterranean University. Her research interests include computer networks, wireless ad hoc networks, distributed systems, cloud computing, system simulation, information security

References

Wang SJ (2005) Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164:99–116

Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39(6):1155-1167

Chen WY (2007) Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Applied Mathematics and Computation 185(1):432-448

Lin SJ, Lin JC (2007) VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40(12):3652-3666

Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganographic method with pixel-value differencing and modulus. Journal of Systems and Software 81(1):150-158

Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognition 41(8):2674-2683

Chang YJ, Wang RZ, Lin JC (2008) Hiding images using modified search-order coding and modulus function. International Journal of Pattern Recognition and Artificial Intelligence 22(6):1215-1240

Chang CC, Hsiehb YP, Lina CH (2008) Sharing secrets in stego images with authentication. Pattern Recognition 41(10):3130-3137

Hsieha YP, Changa CC, Liua LJ (2008) A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10):3104-3113

Lin IC, Lin YB, Wang CM (2009) Hiding data in spatial domain images with distortion tolerance. Computer Standards & Interfaces 31(2):458-464

Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognition 43(1):397-404

Chang CC, Hsieh YP (2010) A chaotic map-based adaptive variable-size LSB method with pixel-value differencing and modulus. Image Science Journal 58(1):49-60

Chen LST, Lin SJ, Lin JC (2010) Reversible JPEG-based hiding method with high hiding-ratio. International Journal of Pattern recognition and Artificial Intelligence 24(3):433-456

Lou DC, Wu NI, Wang CM et al (2010) A novel adaptive steganography based on local complexity and human vision sensitivity. Journal of Systems and Software 83(7):1236-1248

Yang CH, Weng CY, Wang SJ et al (2010) Varied PVD+LSB evading detection programs to spatial domain in data embedding systems. Journal of Systems and Software 83(10):1635-1643

Wu NI, Fu KC, Wang CM (2010) A novel data hiding method for gray scale images based on pixel-value differencing and modulus function. Journal of Internet technology 11(7):1071-1081

Liao X, Wen QY, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation 22(1):1-8

Lin PY, Lee JS, Chang CC (2011) Protecting the content integrity of digital imagery with fidelity preservation. ACM Transaction on Multimedia Computing Communications and Applications 7(3):1-20

Lin CC (2011) An information hiding scheme with minimal image distortion. Computer Standards & Interfaces 33(5):477-484

Lou DC, Hu CH (2012) LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Information Sciences 188:346-358

Liu S, Chen Y, Jiang F et al (2012) A New Steganographic method based on equivalence class partition. Journal of Computational and Theoretical Nanoscience 9(10):1757-1765

Sajasi S, Moghadam AME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Applied Soft Computing 30:375-389

Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik 127(6):3347-3358

Xu WL, Chang CC, Chen TS et al (2016) An improved least-significant-bit substitution method using the modulo three strategy. Displays 42:36-42

Liu L, Chang CC, Wang A (2017) Data hiding based on extended turtle shell matrix construction method. Multimedia Tools and Applications 76(10):12233-12250

Wu NI, Hwang MS (2017) A novel LSB data hiding scheme with the lowest distortion. The Imaging Science Journal 65(6):371-378

Liu L, Chang CC, Anhong W (2017) Data hiding based on extended turtle shell matrix construction method. Multimedia Tools and Applications 76(10):12233-12250

Jana B (2018) Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial. Multimedia Tools Applications 77:8805–8821

Datta B, Roy S, S. Roy, Bandyopadhyay SM (2019) Multi-bit robust image steganography based on modular arithmetic. Multimedia Tools Applications 78(2):1511-1546

Nashat D, Mamdouh L (2019) An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society 27(1):1-4

Zenati A, Ouarda W, Alimi AM (2020) SSDIS-BEM: A New Signature Steganography Document Image System based on Beta Elliptic Modeling. Engineering Science and Technology, an International Journal 23(3):470-82

Zenati A, Ouarda W, Alimi AM (2021) A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimedia Tools and Applications 80(12):18653-7

Ping P, Yang X, Zhang X, Mao Y, Khalid H (2022) Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing. Digital Signal Processing 120. https://doi.org/10.1016/j.dsp.2021.103263

Ko HJ, Huang CT, Tseng H W. Wang SJ (2022) Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube. IEEE Access 10:67686-67693. doi: 10.1109/ACCESS.2022.3185120

Hu Y, Li X, Ma J (2022) A Novel LSB Matching Algorithm Based on Information Pre-Processing. Mathematics 2022, 10, 8.

https://doi.org/10.3390/math10010008.

Chan C-K, Cheng LM (2004) Hiding Data in Images by Simple LSB Substitution. Pattern Recognition 37, 469-474, doi:10.1016/j.patcog.2003.08.007

Published

2023-11-01

How to Cite

Öz, G., & Chefranov, A. (2023). Remainder with Threshold Substitution Data Hiding Scheme: Counterexamples and Modification. IEEE Latin America Transactions, 21(12), 1255–1265. Retrieved from https://latamt.ieeer9.org/index.php/transactions/article/view/8330

Similar Articles

You may also start an advanced similarity search for this article.