A novel spatial data hiding scheme based on generalized

Transcription

A novel spatial data hiding scheme based on generalized
A novel spatial data hiding scheme based on generalized
Fibonacci sequences
E. Mammia , F. Battistia , M. Carlia , A. Neria , and K. Egiazarianb
a University
b Tampere
Roma TRE, Roma, Italy
University of Technology, Tampere, Finland
ABSTRACT
This paper presents a novel spatial data hiding scheme based on the Least Significant Bit insertion. The bitplane decomposition is obtained by using the (p, r)-Fibonacci sequences. This decomposition depends on two
parameters, p and r. Those values increase the security of the whole system; without their knowledge it is
not possible to perform the same decomposition used in the embedding process and to extract the embedded
information. Experimental results show the effectiveness of the proposed method.
Keywords: LSB insertion, data hiding, (p, r)-Fibonacci sequences, key dependent domain.
1. INTRODUCTION
Multimedia communication is a key-factor in the information technology revolution. It allows to share, to
transmit, and to acquire digital information. In this dynamical scenario, the security and the privacy of the
content is a big concern. A basic requirement is that only the intended recipient should be able to gain access
to the hidden contents of the transmitted data. A common solution to this problem is the use of a ciphering
system to conceal the information content of the message.
Sometimes, it is also desirable to hide to an external observer the whole transmission instance, that can be
even the fact that the transmission is taking place is secret. Several techniques for hiding the sensitive data,
the watermark, into an apparently innocuous document have been recently proposed in literature. Since the
final document tends to appear a plausible one to both humans and machines, the possibility of detecting the
presence of the secret message is becoming harder.
In literature many embedding schemes have been proposed, some of them are working in a transformed
domain (Discrete Cosine Transform (DCT)1 , Discrete Fourier Transform (DFT), Discrete Wavelet Transform
(DWT)2 ), some others operate directly in the spatial domain. In both cases the embedding scheme has to fulfill
three main requirements concerning visibility, robustness, and capacity. Visibility is related to the ability of a
human observer to perceive distortions impacting on quality, as well as to the possibility of detecting hidden data
by some statistical analysis. Robustness refers to the impossibility to remove, modify, or substitute the secret
message once it has been inserted. The capacity of the embedding method is defined as the maximum amount
of information that can be hidden in the cover image for a given visibility level. Those three requirements are
strictly related and the increase of one of them, results in the decrease of the others; a trade-off is often necessary.
In our work we propose an extension of a spatial technique: the Least Significant Bit (LSB) insertion3 -4 - . The classic LSB algorithm allows to obtain an high capacity at the expenses of its robustness. This is
due to the fact that an attacker can easily remove or modify the watermark, when it is hidden in the least
significant bit-plane, without significantly affect the quality of the cover image. In this paper we propose an
alternative bit-plane decomposition based on the (p, r)-Fibonacci sequences. In essence, based on an extension
of the Zeckendorf theorem, we convert the binary representation of an image into the representation using the
(p, r) Fibonacci numbers. The watermark is then inserted by modifying the elements of the bit-planes of the
Fibonacci domain. Since the transformation strictly depends on the actual pair (p, r), greater robustness and
undetectability can be achieved when this pair is kept secret.
5 6
The paper is organized as follows. In Section 2 the Fibonacci representation of a decimal number is presented.
In Section 3, the proposed embedding and extraction schemes are described. The experimental results are
reported in Section 4. Finally in Section 5 we draw our conclusions.
Corresponding author: [email protected], [email protected]
2. THE FIBONACCI P,R SEQUENCES
The easiest way to hide digital data in a host signal is the embedding in the spatial domain. This technique
is characterized by low computational complexity, low cost, and low delay. Furthermore, it allows the selection
of the spatial location to embed the data. This is extremely useful when the perceptual invisibility of the
superimposed watermark on the host data is a strict requirement.
Let us denote with I the original luminance component of the image with values in the range [0, 2L − 1], and
with w = {w0 , w1 , ..., wn−1 } a binary watermark.
Each pixel I(i, j) of the cover image can be represented through its binary representation, as follows:
I(i, j) =
L−1
X
ek · 2k ,
(1)
k=0
where ek are binary digits. In the classical LSB embedding methods, the secret message is inserted into the
least-significant bit planes of the cover image either by replacing or by modifying a subset of them, according
to a specific invertible function. The main advantage of such a technique is that, if L is large enough, the
modification of the LSB plane does not significantly affect the perceived overall image quality. As an example,
the visual impact of performing the embedding in different bit-planes is shown in Figure 1.
(a)
(e)
(b)
(f)
(c)
(d)
(g)
(h)
Figure 1. Visual impact when the LSB is performed in each bit-plane, from the least significant one (a) to the most
significant one (h).
The improvement we introduce in this paper is the embedding of the watermark into the bit planes associated
to the representation of the luminance component in terms of (p, r)-Fibonacci sequences. To illustrate the
method, we recall that a (p, r)-Fibonacci sequence is defined by the following recursive formula:

 0,
1,
Fp,r (n) =
 Pr
n < 0;
n = 0;
j=0 Fp,r (n − 1 − j · p), n > 0.
(2)
Let us notice that each element in the sequence is obtained by adding the previous r elements, taken at distance
p. Some examples of (p, r)-Fibonacci sequences, for r equal to 2 are shown in Table 1. As an extension of
the Zeckendorf theorem7 : ”Each positive integer m can be represented as the sum of distinct numbers in the
sequence of Fibonacci numbers using two no consecutive Fibonacci numbers”, it can be demonstrated that,
by using a (p, r)-Fibonacci sequence, with p ≥ 0, and r > 1, any positive natural number N can be always
represented as follows:
N=
n−1
X
ci Fp,r (i).
(3)
i=p
One drawback presented by the Fibonacci representation is the redundancy. In fact each decimal number can
have more than one representation. To obtain a unique representation of a number, using a (p, r)-Fibonacci
sequence, it is necessary to fulfill the following constraints:
• a valid (p, r)-Fibonacci coefficient vector c must contain less than p − 1 zeros between two ones.
• a valid (p, r)-Fibonacci coefficient vector c cannot contain more than r consecutive groups, being constituted
by one symbol equal to 1 followed by p − 1 symbols equal to 0.
Table 1. Generalized Fibonacci p-r-sequences when r=2, Fp,r=2 (n).
p=1
p=2
p=3
p=4
p=5
n=0
1
1
1
1
1
n=1
1
1
1
1
1
n=2
2
1
1
1
1
n=3
4
2
1
1
1
n=4
7
3
2
1
1
n=5
13
5
3
2
1
n=6
24
8
4
3
2
n=7
44
12
6
4
3
n=8
81
19
9
5
4
To demonstrate the importance of a key-dependent bit-plane decomposition, the Fibonacci representation of
the number 255 is shown when r = 1 (Table 2) and r = 2 (Table 3) for different values of p. It is possible to
notice that different combinations of p and r allow to obtain different representations of the same number. It is
important to underline the relevance of the secret keys p, r; without disclosing these two parameters the hidden
message cannot be recovered as shown in Figure 2.
Table 2. Examples of the cp coefficients corresponding to the representation of the number 255 for the sequence Fp,r=1 (n).
p=2
p=3
p=4
0
0
0
0
0
1
0
0
0
0
0
0
1
1
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
Table 3. Examples of the cp coefficients corresponding to the representation of the number 255 for the sequence Fp,r=2 (n).
p=2
p=3
p=4
0
0
0
1
0
0
0
0
0
1
1
1
0
0
0
0
0
0
1
1
0
0
0
0
1
0
0
0
0
1
0
0
0
1
0
0
0
0
0
0
1
0
0
1
3. PROPOSED EMBEDDING SCHEME
The proposed technique is based on a modified Least Significant Bit insertion scheme. In particular we propose to
perform the bit planes decomposition by using the (p, r)-Fibonacci sequence. To reduce the perceived distortion
on the watermarked image we select the areas to be modified on the base of a Local Activity Index (LAI) that
takes into account the characteristics of the Human Visual System (HVS). In the performed simulations the LAI
is based on the variance brightness.
(a) Original watermark
(d) p=3 r=2
(b) p=0 r=1
(e) p=4 r=4
(c) p=2 r=3
(f) p=2 r=2
Figure 2. Example of extracted watermarks when wrong combinations of p and r (b-e) and the right combination (f)
are used.
3.1. Embedding procedure
Based on the previous considerations the embedding procedure is performed as follows:
• the luminance component of the cover image I of size N × N is partitioned in k non overlapping blocks bi
with i = 1, . . . , k of size 8 × 8 pixels;
• the LAI of each block bi is computed and the blocks are ranked in ascending order;
• the watermark is inserted in lexicographic order in the least significant bit-plane of the (p,r )-code of the
pixels belonging to the blocks with the highest rank; blocks with high activity usually contain contours,
textures, eventually noise, and they are more robust with respect to embedding, than those with low
activity, that contain mainly flat regions.
• for each bit in bi : if the uniqueness constraints are fulfilled and the Fibonacci (p, r) coefficient vector is
valid, the embedding is performed by substitution in the selected bit-plane otherwise the next bit in the
block is considered;
• if all the suitable bits in bi have been utilized, the next block is considered;
• when the watermark has been entirely inserted in the cover image, the watermarked image is reconstructed
by the Fibonacci’s representation of each blocks.
3.2. Blind extraction
The blind extraction of the watermark requires the knowledge of its length, the set of bit-planes where it has
been inserted, and the secret key pair (p, r). As illustrated in Figure 2, the use of a wrong pair leads to useless
images, even if the other parameters are correct.
It is important to underline that the embedding capacity is content related. In Table 4 the capacity for some
images and for some (p, r)-Fibonacci sequences are reported. For this set, the minimum embedding capacity is
equal to the 40% of the size of the original image.
Table 4. Capacity values (bit) for some example sequences Fp,r (n).
Airfield
Baboon
Barbara
Boat
F16
Hill
Lake
Lena
Peppers
p = 2, r = 2
166983
167306
170382
170205
174537
168690
166910
170713
165793
p = 3, r = 2
143075
151554
153918
154634
158953
153855
149246
152712
148103
p = 3, r = 3
143893
155722
155791
154419
158988
155629
153560
154684
150478
p = 4, r = 3
137945
140342
140526
141184
139738
138365
143099
139847
140450
4. EXPERIMENTAL RESULTS
To verify the effectiveness of the proposed method, several tests have been performed. A set of nine cover images
of size 512 × 512 pixels has been utilized. In the experiments the inserted watermark is a binary matrix of size
128 × 128 pixels. The perceived quality of the watermarked image has been evaluated through the Peak Signal
to Noise Ratio (PSNR):
µ
¶
L2
P SN R(db) = 10 log10
,
M SE
and the Weighted Peak Signal to Noise Ratio (WPSNR):
µ
W P SN R(db) = 10 log10
max(F )2
||N V F (F 0 − F )||2
¶
,
where F and F 0 represent the two images that are compared and NVF is the Noise Visibility Function whose
value is 1 in flat regions and zero in textured regions and along edges (Voloshynovskiy et al. 2001, Watson et al.
1997).
In the following the comparison between the Fibonacci and the classical binary decomposition is performed.
In the first case the parameters p and r allow to choose the number of bit-planes in which the image can be
decomposed. This is possible thanks to the Equation 3. On the other hand, in the binary representation the
number of bit-planes is strictly defined by the cardinality of the numbers to be represented. To compare the
(p, r)-Fibonacci sequences with the binary one we performed some simulations. Tables 5 and 6 report the PSNR
and WPSNR values obtained for Fp,r=1 (n) and Fp,r=2 (n) by varying the bit-plane chosen for the embedding
from the least significant one to the fifth least significant one for the image Peppers.
(a) PSNR(dB)
p=0
p=1
p=2
p=3
p=4
LSB
67,3
67,2
67,3
67,1
67,5
2
61,3
61,1
61,1
61,3
61,6
3
55,2
58,0
57,5
58,0
57,7
(b) WPSNR(dB)
4
49,2
53,3
55,2
55,3
55,6
5
42,9
49,0
51,7
53,7
53,6
p=0
p=1
p=2
p=3
p=4
LSB
79,1
79,1
79,1
79,2
79,1
2
73,2
73,2
73,1
73,1
73,1
3
67,1
69,8
69,6
69,6
69,6
4
60,1
64,8
67,0
67,1
66,9
5
52,4
60,1
63,2
64,9
65,1
Table 5. PSNR (a) and WPSNR (b) values (dB) obtained for five combinations of p and r=1 by varying the bit-plane
chosen for the embedding from the LSB to the fifth LSB for the image Peppers.
In Table 5 it is possible to compare the behavior of the binary decomposition (corresponding to the case when
p = 0, r = 1) versus some examples of Fp,r (n). The obtained results show a common trend for the PSNR and
(a) PSNR(dB)
p=1
p=2
p=3
p=4
p=5
LSB
67,2
67,4
67,1
67,0
67,1
2
61,2
61,1
61,1
61,1
61,3
3
55,4
57,7
57,9
57,8
57,8
(b) WPSNR(dB)
4
50,1
53,2
55,0
55,1
54,7
5
44,8
49,2
52,0
57,4
52,7
p=1
p=2
p=3
p=4
p=5
LSB
79,1
79,1
79,1
79,2
79,1
2
73,3
73,1
73,2
73,0
73,2
3
67,1
69,6
69,6
69,7
69,6
4
61,6
65,0
66,9
67,0
66,9
5
55,0
60,1
63,1
64,9
65,2
Table 6. PSNR (a) and WPSNR (b) values (dB) obtained for five combinations of p and r=2 by varying the bit-plane
chosen for the embedding from the LSB to the fifth LSB for the image Peppers.
WPSNR. An increase in the perceptual importance of the bit-plane where the embedding is performed, results in
a degradation in the values of both the quality metrics. It is possible to notice that the classical LSB technique
is equivalent to the Fibonacci LSB one in terms of PSNR and WPSNR, if the embedding is performed in the
least significant bit-plane. When increasing the perceptual importance of the selected bit-plane, the Fibonacci
case outperforms the classical one. In particular, when we consider the fifth least significant bit-plane, the PSNR
gains 11dB with respect to the classical LSB in the case Fp=5,r=1 (n). This suggests that different bit-planes
other than the least significant one can be used. Figure 3 shows the resulting watermarked images when the
binary representation is used (b) and when the (p, r)-Fibonacci sequences are used (c-d).
(a) Original image
(b) Fp=0,r=1 (n)
(c) Fp=2,r=1 (n)
(d) Fp=2,r=2 (n)
Figure 3. Example of watermarked images when different (p, r)-Fibonacci sequences are used.
Table 6 shows the results obtained for some Fp,r (n). In this case the PSNR and WPSNR are computed
when the watermark is inserted in the least significant bit-plane. Finally, in Table 7, the PSNR and WPSNR
are evaluated when the maximum capacity of the cover image is exploited.
Table 7. PSNR(dB) and WPSNR(dB) values between the original image and five watermarked images when the maximum
embedding capacity is exploited.
PSNR
p = 2, r = 2
p = 3, r = 2
p = 3, r = 3
p = 4, r = 3
WPSNR
p = 2, r = 2
p = 3, r = 2
p = 3, r = 3
p = 4, r = 3
Airfield
51,12
51,16
51,14
51,14
Airfield
65,98
65,41
65,81
65,66
Baboon
51,16
51,13
51,14
51,16
Baboon
66,38
66,33
66,38
66,31
Barbara
51,14
51,16
51,14
51,17
Barbara
66,28
66,36
66,33
66,29
Boat
51,15
51,14
51,15
51,15
Boat
66,26
66,28
66,24
66,23
F16
51,16
51,13
51,14
51,15
F16
66,22
66,03
66,11
65,88
Hill
51,14
51,12
51,16
51,16
Hill
66,29
66,27
66,31
66,38
Lake
51,14
51,14
51,13
51,12
Lake
66,19
66,27
66,27
66,27
Lena
51,13
51,14
51,16
51,13
Lena
66,19
66,19
66,33
66,19
Peppers
51,13
51,13
51,15
51,15
Peppers
65,99
66,02
66,12
66,05
5. CONCLUSIONS
In this paper we have introduced a novel data hiding scheme based on the (p, r)-Fibonacci sequences. We propose
a modification of the traditional LSB embedding technique. The luminance component of each pixel of the image
is decomposed by using two secret parameters p and r. This key-dependence increases the secrecy of the whole
system while maintaining a low computational complexity. The watermarked image presents less artifacts than
the ones obtained in the classical LSB scheme as demonstrated by the PSNR and WPSNR values.
REFERENCES
1. J. R. Hernandez, J. M. Rodrı́guez, and F. Pérez-González, “Improving the performance of spatial watermarking of images using channel coding,” Signal Process. 80(7), pp. 1261–1279, 2000.
2. F. Battisti, K. Egiazarian, M. Carli, and A.Neri, “Data hiding based on Fibonacci-Haar transform,” in Mobile
Multimedia/Image Processing for Military and Security Applications, S. Agaian and S. Jassim, eds., SPIE
Defense and Security 6579, May 2007.
3. J. Mielikainen, “Lsb matching revisited,” Signal Processing Letters, IEEE 13(5), pp. 285–287, 2006.
4. M. G. J. Fridrich and R. Du, “Reliable detection of LSB steganography in grayscale and color images,” Proc.
ACM, Special Session on Multimedia Security and Watermarking , pp. 27–30, 2000.
5. A. N. F. Battisti, M. Carli and K. Egiaziarian, “A generalized fibonacci LSB data hiding technique,” in IEEE
International Conference on Computers and Devices (CODEC 2006), Kolkata, India, December 2006.
6. S. S. Agaian, R. C. Cherukuri, and R. R. Sifuentes, “Key dependent covert communication system using
fibonacci p-codes,” System of Systems Engineering, 2007. SoSE ’07. IEEE International Conference on ,
pp. 1–5, 16-18 April 2007.
7. V.E.Hoggatt, “Fibonacci and Lucas numbers,” The Fibonacci Association , 1972.