An Efficient Block Based Self-Secured (BBSS) LSB Embedding Scheme over OFDM Based Wireless Communication Channel

Authors

  • Abhijit S. Mali Ramrao Adik Institute of Technology, D. Y. Patil Deemed to be University, Nerul, Navi Mumbai. Maharashtra, India, 400706
  • Manoj M. Dongre Ramrao Adik Institute of Technology, D. Y. Patil Deemed to be University, Nerul, Navi Mumbai. Maharashtra, India, 400706

Keywords:

Block Based Self-Secured, steganography, OFDM, Wireless Communication, LSB Embedding, Natural Logarithm and AWGN.

Abstract

The paper presents an efficient and robust Block Based Self-Secured (BBSS) image steganography approach for secured transmission over OFDM (Orthogonal Frequency Division Multiplexing) based Wireless Communication (WC) Channel. The suggested BBSS scheme uses LSB Embedding (LSB-E) with low computational complexity and maintains a balance between perceptual quality and security. The 9:1 (bytes) embedding scheme finds the initial index position in the 8-neighbours considered clockwise from top left corner of a 3x3 block of the center pixel. The index is function of the magnitude of the center pixel and found using the Natural Logarithm. The proposed embedding scheme is highly immune to any unwanted noise for values of center pixel above 12. The paper evaluates the performance of the proposed BBSS steganography scheme using BPSK (Binary phase shift keying) modulated WC channel with AWGN (Additive White Gaussian Noise) interference. The simulation results showed lossless transmission at 10 dB signal to noise ratio, high PSNR of 51.65 and 99.95% structural similarity between the target and recovered stego image.

Downloads

Download data is not yet available.

References

C.-Y. Chang and S. Clark, “Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method,” Computational Linguistics, vol. 40, no. 2, pp. 403–448, 2014.

J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” in Proceedings of the SPIE, vol. 4314, pp. 197–208, San Jose, CA, USA, January 2001.

C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 97–105, 2003.

J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003.

M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, 2004.

M. U. Celik, G. Sharma, and A. M. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Transactions on Image Processing, vol. 15, no. 4, pp. 1042–1049, 2006.

S. Lee, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integer-to-integer wavelet transform,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 321–330, 2007.

X. Huang, A. Nishimura, and I. Echizen, “A reversible acoustic steganography for integrity verification,” in Proceedings of International Workshop on Digital Watermarking (IWDW), pp. 305–316, Seoul, Korea, October 2010.

D. Coltuc, “Low distortion transform for reversible watermarking,” IEEE Transactions on Image Processing, vol. 21, no. 1, pp. 412–417, 2012.

W. Zhang, X. Hu, X. Li, and Y. Nenghai, “Optimal transition probability of reversible data hiding for general distortion metrics and its applications,” IEEE Transactions on Image Processing, vol. 24, no. 1, pp. 294–304, 2015.

B. Ma and Y. Q. Shi, “A reversible data hiding scheme based on code division multiplexing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1914–1927, 2016.

F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.

J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997.

R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002.

C.-C. Lai and C.-C. Tsai, “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp. 3060–3063, 2010.

J. Fridrich, “Image watermarking for tamper detection,” in Proceedings of International Conference on Image Processing(ICIP), pp. 404–408, Chicago, IL, USA, October 1998.

D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180, 1999.

T.-Y. Lee and S. D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, no. 11,pp. 3497–3506, 2008.

J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, “Writing on wet paper,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3923–3935, 2005.

V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, no. 1, pp. 1–13, 2014.

Sabah A. Jebur, Abbbas K. Nawar, Lubna E. Kadhim and Mothefer M. Jahefer, “Hiding Information in Digital Images Using LSB Staganography Technique,” iJIM, volume 17, No. 7, 2023.

Jayakanth Kunhoth, Nandhini Subramanian, Somaya Al-Maadeed and Ahmed Bouridane, “Video steganography: recent advances and challenges,” Multimedia Tools and Applications, 2023, https://doi.org/10.1007/s11042-023-14844-w.

Xing-Yuan Wang, Xiao-Li-Wang, Lin Teng, Dong-Hua Jiang and Yongjin Xian, “Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing,” Chinese Physics B, Volume 32, No. 2, 2023, 020503.

Tutuncu K. and Demirci B., “Adaptive LSB Steganography on Chaos Theory and Random Distortion,” Advances in Electrical and Computer Engineering, volume 18, Issue 3, 2018, pp. 15-22.

D. Molato, F. B. Calanda, A. M. Sison and R. P. Medina, "LSB-based Random Embedding Image Steganography Technique Using Modified Collatz Conjecture," 2022 7th International Conference on Signal and Image Processing (ICSIP), Suzhou, China, 2022, pp. 367-371.

Shahidrahman, Jamal Uddin, Hameed Hussain et al. A Huffman Code LSB based Image Steganography Technique Using Multi-Level Encryption and Achromatic Component of an image, 08 March 2023, PREPRINT (Version 1) available at Research Square [https://doi.org/10.21203/rs.3.rs-2579014/v1]

Rana S. Hameed, Siti S. Mokri, Mustafa S. Taha and Mustafa M. Yaher, “High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method,” International Journal of Advanced Computer Science and Applications(IJACSA), 13(8), 2022.

Sama N. M. Al-Faydi, Shar Khalid Ahmed and Heba N. Y. Al-Talb, “Improved LSB image steganography with high imperceptibility based on cover-stego matching,” IET Image Processing, volume 17, Issue 7, 29 May 2023, pp. 2072-2082.

Hsien-Wen Tseng and Hui-Shih Leng, “A reversible modified least significant bit matching revisited method,” Signal Processing: Image Communication, volume 101, February 2022, 116556.

Ambika, Virupakshappa and Sachinkumar Veerashetty, “Secure communication over wirless sensor network using image steganography with generative adversarial networks,” Measurement: Sensors, volume 24, December 2022, 100452.

Krystian Grzesiak, Zbigniew Piotrowski and Jan M. Kelner, “A wireless covert channel based on dirty constellation with phase drift,” Electronics, volume 10, 2012, 647.

Asmaa A. Eyssa, Fathi E. Abdelsamie and Abdelaziz E. Adelnaiem, “An efficient image steganography approach over wireless communication system,” Wireless Personal Communication, volume 110, 2020, pp. 321-337.

Lin, Hanhe and Hosu, Vlad and Saupe, Dietmar, “KADID-10k: A Large-scale Artificially Distorted IQA Database,” In Proceeding of 10th International Conference on Quality of Multimedia Experience (QoMEX), IEEE, 2019, pp. 1-3.

T.S. Rappaport, Wireless Communications, Prentice-Hall, 1996.

Hacimurtazaoglu M, Tutuncu K. 2022. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. Peer J Comput. Sci. 8:e843.

Amirfarhad Nilizadeh, Shirin Nilizadeh, Wojciech Mazurczyk, Cliff Zou and Gary T. Leavens, “Adaptive Matrix Pattern Steganography,” Journal of Cyber Security and Mobility, Vol. 11(1), pp. 1–28, 2021.

Huang, C.T.; Shongwe, N.S.; Weng, C.-Y. Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology. Electronics 2023, 12, 1200.

Granados, C. (2023). Convergence of Neutrosophic Random Variables. Advances in the Theory of Nonlinear Analysis and Its Applications, 7(1), 178–188.

Naas, A., Benbachir, M., Abdo, M. S., & Boutiara, A. (2022). Analysis of a fractional boundary value problem involving Riesz-Caputo fractional derivative. Advances in the Theory of Nonlinear Analysis and Its Applications, 6(1), 14–27.

Khetani, V., Gandhi, Y., Bhattacharya, S., Ajani, S. N., & Limkar, S. (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253-262.

Sairise, Raju M., Limkar, Suresh, Deokate, Sarika T., Shirkande, Shrinivas T. , Mahajan, Rupali Atul & Kumar, Anil(2023) Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1569–1583, DOI: 10.47974/JDMSC-1825

Downloads

Published

12.01.2024

How to Cite

Mali, A. S. ., & Dongre, M. M. . (2024). An Efficient Block Based Self-Secured (BBSS) LSB Embedding Scheme over OFDM Based Wireless Communication Channel. International Journal of Intelligent Systems and Applications in Engineering, 12(12s), 433 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4529

Issue

Section

Research Article