Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Hiding Two Binary Images in Grayscale BMP Image via Five Modulus Method

Firas A. Jassim
Department of Computer Information Systems, Irbid National University, Irbid 2600, Jordan
Research Journal of Applied Sciences, Engineering and Technology  2014  20:4235-4243
http://dx.doi.org/10.19026/rjaset.7.794  |  © The Author(s) 2014
Received: November 22, 2013  |  Accepted: February 15, 2014  |  Published: May 20, 2014

Abstract

The aim of this study is to hide two binary BMP images in a single BMP grayscale image. The widespread technique in image steganography is to hide one image (stego image) into another (cover image). The proposed novel method is to hide two binary images into one grayscale bitmap cover image. First of all, the proposed technique starts with transforming all grayscale cover image pixels into multiples of five using Five Modulus Method (FMM). Clearly, any modulus of five is either 0, 1, 2, 3, or 4. The transformed FMM cover image could be treated as a good host for carrying data. Obviously, it is known that the pixel value for the binary image is either 0 or 1. Therefore, by concatenating the two binary images, the composite results are 00, 01, 10 and 11. In fact, these concatenated values could be mapped using simple mapping that assigns a positive integer value such as 1 for 00, 2 for 01, 3 for 10 and 4 for 11. Consequently, a new matrix will be constructed that contains a number varying from 1 to 4 only. Fortunately, the four integer values are the same as the previously mentioned reminders of division by 5, hence, adding these four integers to the transformed FMM cover image. On the recipient side, a reverse process will be implemented to extract the two binary images. In terms of PSNR values, the cover image and the two extracted stego images have acceptable PSNR values, which yields that the proposed method is very efficient in information hiding.

Keywords:

Binary image, cover image, information hiding, statistical steganography, steganography, stego image,


References

  1. Abboud, G., J. Marean and R.V. Yampolskiy, 2010. Steganography and visual cryptography in computer forensics. Proceedings of the 5th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE '10), pp: 25-32.
    CrossRef    
  2. Artz, D., 2001. Digital steganography: Hiding data within data. IEEE Internet Comput., 5(3): 75-80.
    CrossRef    
  3. Barni, M., 2006. Document and Image Compression. Taylor and Francis, NY.
    CrossRef    PMCid:PMC1936364    
  4. Brisbane, A., 1911. Speakers give Sound Advice. Syracuse Post Standard, pp: 18.
  5. Chakraborty, S. and S.K. Bandyopadhyay, 2013. A steganography approach to hiding two images using dna microarray. Int. J. Innov. Res. Comput. Commun. Eng., 1(2): 158-162.
  6. Cox, I.J., J. Kilian, F.T. Leighton and T. Shamoon, 1996. A secure, robust watermark for multimedia. Proceedings of the 1st International Workshop on Information Hiding, pp: 185-206.
    CrossRef    
  7. Gonzalez, R.C. and R.E. Woods, 2008. Digital Image Processing. 3 Edn., Prentice Hall, NJ.
  8. Holub, V. and J. Fridrich, 2013. Digital image steganography using universal distortion. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security (IH& MMSec '13). New York, USA, pp: 59-68.
    CrossRef    
  9. Hore, A. and D. Ziou, 2010. Image quality metrics: PSNR vs. SSIM. Proceedings of the 20th International Conference on Pattern Recognition (ICPR), pp: 2366-2369.
    CrossRef    
  10. Jassim, F.A., 2012. Five modulus method for image compression. Signal. Image Process. Int. J., 3(5): 19-28.
    CrossRef    
  11. Jassim, F.A., 2013a. Hiding image in image by five modulus method for image steganography. J. Comput., 5(2): 21-25.
  12. Jassim, F.A., 2013b. Image compression by embedding five modulus method into jpeg. Signal. Image Process. Int. J., 4(2): 31-39.
    CrossRef    
  13. Jassim, F.A., 2013c. k-modulus method for image transformation. Int. J. Adv. Comput. Sci. Appl., 4(2): 267-271.
  14. Jassim, F.A., 2013d. A novel steganography algorithm for hiding text in image using five modulus method. Int. J. Comput. Appl., 72(17): 39-44.
  15. Johnson, N.F. and S. Jajodia, 1998. Exploring steganography: Seeing the unseen. Computer, 31(2): 26-34.
    CrossRef    
  16. Kahn, D., 1983. The Codebreakers: The Story of Secret Writing. Macmillan, New York.
  17. Katzenbeisser, S. and F.A. Petitcolas, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. 1st Edn., Artech House Inc., Norwood, MA, USA.
  18. Kieu, T.D. and C.C. Chang, 2009. An image authentication based on discrete Fourier transform. Fund. Inform., 97(4): 369-379.
  19. Lyu, S. and H. Farid, 2006. Steganalysis using higher-order image statistics. IEEE T. Inf. Foren. Sec., 1(1): 111-119.
    CrossRef    
  20. Marvel, L.M., C.G. Boncelet Jr. and C.T. Retter, 1999. Spread spectrum image steganography. IEEE T. Image Process., 8(8): 1075-1083.
    CrossRef    PMid:18267522    
  21. Provos, N. and P. Honeyman, 2003. Hide and seek: An introduction to steganography. IEEE Secur. Priv., 1(3): 32-44.
    CrossRef    
  22. Raja, K.B., C.R. Chowdary, K.R. Venugopal and L.M. Patnaik, 2005. A secure image steganography using lsb, dct and compression techniques on raw images. Proceedings of the 3rd International Conference on Intelligent Sensing and Information Processing (ICISIP '05), pp: 170-176.
    CrossRef    
  23. Stockman, G. and L.G. Shapiro, 2001. Computer Vision. 1st Edn., Prentice Hall PTR, Upper Saddle River, NJ, USA.
    PMCid:PMC88079    
  24. Wang, H. and S. Wang, 2004. Cyber warfare: Steganography vs. steganalysis. Commun. ACM, 47(10): 76-82.
    CrossRef    
  25. Xia, X.G., C.G. Boncelet and G.R. Arce, 1997. A multiresolution watermark for digital images. Proceedings of the International Conference on Image Processing (ICIP '97), 1: 548-551./>

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved