Skip to main content
Log in

Image steganography using contourlet transform and matrix decomposition techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents the transform domain image steganography schemes using three popular matrix factorization techniques and contourlet transform. It is known that security of image steganography is mainly evaluated using undetectability of stego image when steganalyzer examines it in order to detect the presence of hidden secret information. Good imperceptibility only suggests eavesdropper’s inability to suspect about the hidden information; however stego image may be analyzed by applying certain statistical checks when it is being transmit- ted through the channel. This work focusses on improving undetectability by employing ma- trix decomposition techniques along with transform domain image steganography. Singular value decomposition (SVD), QR factorization, Nonnegative matrix factorization (NMF) are employed to decompose contourlet coefficients of cover image and secret is embedded into its matrix factorized coefficients. The variety of investigations include the effect of matrix decomposition techniques on major attributes of image steganography like imperceptibility, robustness to a variety of image processing operations, and universal steganalysis perfor- mance. Better imperceptibility, large capacity, and poor detection accuracy compared to existing work validate the efficacy of the proposed image steganography algorithm. Compa- rative analysis amongst three matrix factorization methods is also presented and analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. http://www.cs.washington.edu/research/imagedatabase (Accessed: 2013-07-5)

  2. Ahn CJ (2008) Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM. IEEE Trans Vehicular Techn 57 (4):2578–2582

    Article  Google Scholar 

  3. Borraa S, Thankib R, Deyc N, Borisagard K (2018) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health Article in Press. https://doi.org/10.1016/j.smhl.2018.02.001

  4. Chen C, Shi Y Q (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE ISCAS International Symposium on Circuits and Systems: 3029–3032

  5. Debnath, Diptasree, Ghosh, Emlon, Banik G, Barnali (2019) Multiple RGB image steganography using arnold and discrete cosine transformation: eHaCON 2018, Kolkata, India. https://doi.org/10.1007/978-981-13-1544-2-13

  6. Denemark T, Fridrich J (2017) Steganography with multiple JPEG images of the same scene. IEEE Trans Inf Forensics Secur https://doi.org/10.1109/TIFS.2017.2705625

  7. Do M, Vetterli M (2002) Contourlets: a directional multiresolution image representation. IEEE Int Conf Image Process 1:357–360

    Article  Google Scholar 

  8. Duan X, Song H (2018) Coverless information hiding based on generative model. CoRR, vol. arXiv:1802.03528

  9. ElSayed A, Elleithy AR, Thunga P, Wu ZP (2015) Highly secure image steganography algorithm using curvelet transform and DCT encryption. In: IEEE conference on systems, applications and technology conference (LISAT). https://doi.org/10.1109/LISAT.2015.7160204

  10. Fakhredanesh M, Rahmati M, Safabakhsh R (2019) Steganography in discrete wavelet transform based on human visual system and cover model. Multimed Tools Appl. https://doi.org/10.1007/s11042-019-7238-8

  11. Ghosh E, Debnath D, Gupta Banik B (2019) Blind RGB image steganography using discrete cosine transformation. In: Abraham A, Dutta P, Mandal J, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 814. Springer, Singapore

  12. Gulve AK, Joshi MS (2015) An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Hindawi mathematical problems in engineering 2015, Article ID 684824

  13. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Appl 41(14):6123– 6130

    Article  Google Scholar 

  14. Ker A (2017) The square root law of steganography: bringing theory closer to practice. ACM Workshop on Information Hiding and Multimedia Security

  15. Kodovsky J, Fridrich J (2009) Calibration revisited. In: Dittmann J, Craver S, Fridrich J (eds) Proceedings of the 11th ACM multimedia and security workshop. Princeton, September 7-8

  16. Lee D, Seung H (1999) Learning the parts of objects by nonnegative matrix factorization. Nature 40:788–791

    Article  MATH  Google Scholar 

  17. Lee D, Seung H (2001) Algorithms for nonnegative matrix factorization. Adv Neural Inf Proces Syst 13:556–562

    Google Scholar 

  18. Li Y, Xiong C, Han X, et al. (2018) Image steganography using cosine transform with large scale multimedia application. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5557-1

  19. Lyu S, Farid H (2003) Detecting hidden messages using higher order statistics and support vector machines. IH2002, LNCS 2578:340–354

    MATH  Google Scholar 

  20. Maheswari SU, Hemanth DJ (2015) Frequency domain QR code based image steganography using Fresnelet transform. AEU Int J Electron Commun 69(2):539–544

    Article  Google Scholar 

  21. Mostafa H, Ali AF, El Taweal G (2015) Hybrid curvelet transform and least significant bit for image steganography. In: IEEE seventh international conference on intelligent computing and information systems (ICICIS): 300–305. https://doi.org/10.1109/IntelCIS.2015.7397238

  22. Muhammad N, Bibi N, Mahmood Z, et al. (2015) Blind data hiding technique using Fresnelet transform. Springer-Plus 4:832. https://doi.org/10.1186/s40064-015-1534-1

    Article  Google Scholar 

  23. Ogiela MR, Koptyra K (2015) False and multi-secret steganography in digital images. Soft Comput 19(11):3331–3339

    Article  Google Scholar 

  24. Pevny T, Fridrich J (2007) Merging Markov and DCT features for multiclass JPEG steganalysis. In: Delp EJ, Wong PW (eds) Proceedings SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents IX, 6505: 1 - 3 14, San Jose, CA. 2007

  25. Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimed Tools Appl 77:23673. https://doi.org/10.1007/s11042-018-5713-2

    Article  Google Scholar 

  26. Rabie T, Kamel I (2016) High capacity steganography: a global-adaptive region discrete cosine transform approach. Multimed Tools Appl: 1–21. https://doi.org/10.1007/s11042-016-3301-x

  27. Saidi M, Hermassi H (2016) Rhouma a new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl: 1–18. https://doi.org/10.1007/s11042-016-3722-6

  28. Sajasi S, Moghadam AME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Applied Soft Comput 30:375–389

    Article  Google Scholar 

  29. Sajedi H, Jamzad M (2010) CBS: Contourlet-based steganalysis method. J Signal Process Sys 61:367–373

    Article  Google Scholar 

  30. Schaefer G, Stich M (2004) UCID - An uncompressed colour image database. Proc Storage and Retrieval Methods and Appl for Multimed 5307:472–480

    Google Scholar 

  31. Sharma VK, Mathur P, Srivastava DK (2019) Highly secure DWT steganography scheme for encrypted data hiding. In: Satapathy S, Joshi A (eds) Information and communication technology for intelligent systems. Smart innovation, systems and technologies, vol 106. Springer, Singapore

  32. Shirafkan MH, Akhtarkavan E, Vahidi J (2015) A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed Solomon encoding. 2nd International conference on knowledge based engineering and innovation

  33. Song XF, Liu F, Yang C, Luo X, Yi Z (2015) Steganalysis of adaptive JPEG steganography using 2D gabor filters IH & MMSec 15 proceedings of the 3rd ACM workshop on information hiding and multimedia security :15–23, Portland, Oregon, USA

  34. Subhedar M S, Mankar V (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13-14:95–113

    Article  MATH  Google Scholar 

  35. Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electrical Eng 54:406–422

    Article  Google Scholar 

  36. Subramanian M, Korah R (2018) A framework of secured embedding scheme using vector discrete wavelet transformation and lagrange interpolation. Hindawi Journal of Computer Networks and Communications,vol. 2018, Article ID 8695103, https://doi.org/10.1155/2018/8695103

  37. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94

    Article  Google Scholar 

  38. Thanki R, Borra S (2018) A color image steganography in hybrid FRT - DWT domain. Int J Inform Sec Appl 40:92–102

    Google Scholar 

  39. Uma Maheswari S, Jude hemanth D (2017) Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76:415. https://doi.org/10.1007/s11042-015-3035-1

    Article  Google Scholar 

  40. USC-SIPI (1997) http://sipi.usc.edu/database

  41. Xiao M, He ZB (2015) High capacity image steganography method based on framelet and compressive sensing. In: Proc SPIE, multispectral image acquisition, processing, and analysis, p 9811

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mansi S. Subhedar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Subhedar, M.S., Mankar, V.H. Image steganography using contourlet transform and matrix decomposition techniques. Multimed Tools Appl 78, 22155–22181 (2019). https://doi.org/10.1007/s11042-019-7512-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7512-9

Keywords

Navigation