A New Approach of Steganography on Image Metadata

Yusra Fernando - Universitas Teknokrat Indonesia, Lampung, 13535, Indonesia
Dedi Darwis - Universitas Teknokrat Indonesia, Lampung, 13535, Indonesia
Abhishek Mehta - Parul University, Gujarat, 380001, India
Wamiliana Wamiliana - Universitas Lampung, Lampung, 13535, Indonesia
Agus Wantoro - Universitas Teknokrat Indonesia, Lampung, 13535, Indonesia


Citation Format:



DOI: http://dx.doi.org/10.62527/joiv.8.2.2110

Abstract


In this paper, we introduce a novel method, Steganography on Image Metadata (SIM), to tackle the problem of robustness modification in steganography.  The SIM method works by embedding messages into the metadata storage space of digital media. Metadata is information embedded in a file that explains the file's content. The advantage of this method is that it does not alter the pixel values in the image, ensuring no degradation in media quality, and the secret message remains secure even when robustness manipulations are applied to the stego-image. To enhance data security, this paper also suggests using Fernet cryptography for message encryption during the embedding process into the cover-image. According to experimental evaluations, the SIM technique can attain a maximum PSNR value of 100 dB and an outstanding MSE value of 0. All robustness manipulation issues in steganography can be effectively addressed using the SIM method. Test results demonstrate that the SIM method can withstand symmetric and asymmetric cropping manipulations down to a pixel size of 1x1, and the message can still be extracted. Testing with image rotation manipulation also proves that the message can be successfully extracted even when the stego-image is rotated up to 180 degrees. Experiments with image resizing manipulation also confirm that the message can be recovered even when the stego-image undergoes up to 90% compression. Testing with color effects applied to the image also does not affect message extraction results.

Keywords


Cover-image, Fernet, Robustness, SIM, Steganography

References


O. F. A. Wahab, A. A. M. Khalaf, A. I. Hussein, and H. F. A. Hamed, “Hiding data using efficient combination of RSA cryptography, and compression steganography techniques,” IEEE Access, vol. 9, pp. 31805–31815, 2021, doi: 10.1109/ACCESS.2021.3060317.

Z. L. Yang, S. Y. Zhang, Y. T. Hu, Z. W. Hu, and Y. F. Huang, “Vae-stega: Linguistic steganography based on variational auto-encoder,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 880–895, 2021, doi: 10.1109/TIFS.2020.3023279.

W. Tang, B. Li, M. Barni, J. Li, and J. Huang, “An automatic cost learning framework for image steganography using deep reinforcement learning,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 952–967, 2021, doi: 10.1109/TIFS.2020.3025438.

N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.

J. Qin, Y. Luo, X. Xiang, Y. Tan, and H. Huang, “Coverless image steganography: A survey,” IEEE Access, vol. 7, pp. 171372–171394, 2019, doi: 10.1109/ACCESS.2019.2955452.

Z. Qu, H. Sun, and M. Zheng, “An efficient quantum image steganography protocol based on improved EMD algorithm,” Quantum Inf Process, vol. 20, no. 2, Feb. 2021, doi: 10.1007/s11128-021-02991-8.

X. Liao, J. Yin, M. Chen, and Z. Qin, “Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features,” IEEE Trans Dependable Secure Comput, vol. 19, no. 2, pp. 897–911, 2022, doi: 10.1109/TDSC.2020.3004708.

X. Duan, D. Guo, N. Liu, B. Li, M. Gou, and C. Qin, “A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network,” IEEE Access, vol. 8, pp. 25777–25788, 2020, doi: 10.1109/ACCESS.2020.2971528.

S. Li, M. Xue, B. Zhao, H. Zhu, and X. Zhang, “Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization,” IEEE Trans Dependable Secure Comput, pp. 1–1, Sep. 2020, doi: 10.1109/tdsc.2020.3021407.

A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar, “Digital audio steganography: Systematic review, classification, and analysis of the current state of the art,” Computer Science Review, vol. 38. Elsevier Ireland Ltd, Nov. 01, 2020. doi: 10.1016/j.cosrev.2020.100316.

M. Dalal and M. Juneja, “Steganography and Steganalysis (in digital forensics): a Cybersecurity guide,” Multimed Tools Appl, vol. 80, no. 4, pp. 5723–5771, Feb. 2021, doi: 10.1007/s11042-020-09929-9.

M. Hassaballah, M. A. Hameed, A. I. Awad, and K. Muhammad, “A Novel Image Steganography Method for Industrial Internet of Things Security,” IEEE Trans Industr Inform, vol. 17, no. 11, pp. 7743–7751, Nov. 2021, doi: 10.1109/TII.2021.3053595.

S. Dhawan, C. Chakraborty, J. Frnda, R. Gupta, A. K. Rana, and S. K. Pani, “SSII: Secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT,” IEEE Access, vol. 9, pp. 87563–87578, 2021, doi: 10.1109/ACCESS.2021.3089357.

Y. Zhao, R. Wang, W. Jia, W. Zuo, X. Liu, and W. Gao, “Deep Reconstruction of Least Significant Bits for Bit-Depth Expansion,” IEEE Transactions on Image Processing, vol. 28, no. 6, pp. 2847–2859, Jun. 2019, doi: 10.1109/TIP.2019.2891131.

C. C. Chang, “Adversarial Learning for Invertible Steganography,” IEEE Access, vol. 8, pp. 198425–198435, 2020, doi: 10.1109/ACCESS.2020.3034936.

A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, “A novel image steganography technique based on quantum substitution boxes,” Opt Laser Technol, vol. 116, pp. 92–102, Aug. 2019, doi: 10.1016/j.optlastec.2019.03.005.

M. Kalita, T. Tuithung, and S. Majumder, “A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution,” Computer Journal, vol. 62, no. 11, pp. 1639–1655, Nov. 2019, doi: 10.1093/comjnl/bxz014.

L. AlFaqawi, M. AbuHaya, and ..., “Alpha channel-Based Indicator For Robustness Forward/Backward LSB Steganography,” … Conference on Information …, 2021, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9636891/

Ms. B. Bhatu and H. Y. Shah, “Customized Approach To Increase Capacity And Robustness In Image Steganography,” in International Conference on Inventive Computation Technologies (ICICT), 2016.

H. Paraskevov, S. Zhelezov, and B. Uzunova-Dimitrova, “Robustness of the secret message in stego file against flip and rotation attack,” Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, vol. 9, no. 1, pp. 5–16, 2017.

L. Ke and Z. Yin, “On the security and robustness of ‘Keyless dynamic optimal multi-bit image steganography using energetic pixels,’” Multimed Tools Appl, 2021, doi: 10.1007/s11042-020-09807-4.

S. K. Moon, “Software and hardware-based audio-video crypto steganalysis model for enhancing robustness and imperceptibility of secured data,” Multimed Tools Appl, 2022, doi: 10.1007/s11042-022-12353-w.

D. Darwis, N. B. Pamungkas, and Wamiliana, “Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness,” in Journal of Physics: Conference Series, 2021. doi: 10.1088/1742-6596/1751/1/012039.

D. Darwis, A. Junaidi, D. A. Shofiana, and Wamiliana, “A New Digital Image Steganography Based on Center Embedded Pixel Positioning,” Cybernetics and Information Technologies, vol. 21, no. 2, 2021, doi: 10.2478/cait-2021-0021.

L. Hartmann and S. Wendzel, “How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data,” European Interdisciplinary Cybersecurity …, 2021, doi: 10.1145/3487405.3487661.

C. M. Kondasinghe, “A System to Preserve Metadata using Steganography.” 2021.

D. Darwis, A. Junaidi, and Wamiliana, “A New Approach of Steganography Using Center Sequential Technique,” in Journal of Physics: Conference Series, 2019. doi: 10.1088/1742-6596/1338/1/012063.

S. W. Bray, “Introduction to Cryptography and Python,” Implementing Cryptography Using Python®, pp. 1–30, 2020, doi: 10.1002/9781119612216.ch1.

R. Rahaeimehr, “Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack,” 2019.

M. T. Suryadi, Y. Satria, “Implementation of the Gauss-Circle Map for encrypting and embedding simultaneously on digital image and digital text,” Journal of Physics …, 2021, doi: 10.1088/1742-6596/1821/1/012037.

R. Wazirali, Z. Chaczko, and J. Gibbon, “Steganographic image sharing app,” Proceedings - 25th International Conference on Systems Engineering, ICSEng 2017, vol. 2017-Janua, pp. 494–499, 2017, doi: 10.1109/ICSEng.2017.62.

D. Darwis, A. Junaidi, and Wamiliana, “A New Approach of Steganography Using Center Sequential Technique,” J Phys Conf Ser, vol. 1338, no. 1, 2019, doi: 10.1088/1742-6596/1338/1/012063.

O. Juarez-Sandoval, M. Cedillo-Hernandez, G. Sanchez-Perez, K. Toscano-Medina, H. Perez-Meana, and M. Nakano-Miyatake, “Compact image steganalysis for LSB-matching steganography,” Proceedings - 2017 5th International Workshop on Biometrics and Forensics, IWBF 2017, 2017, doi: 10.1109/IWBF.2017.7935103.

S. D. Muyco and A. A. Hernandez, “A modified hash based least significant bits algorithm for steganography,” ACM International Conference Proceeding Series, pp. 215–220, 2019, doi: 10.1145/3335484.3335514.

D. R. I. M. Setiadi, “PSNR vs SSIM: imperceptibility quality assessment for image steganography,” Multimed Tools Appl, vol. 80, no. 6, pp. 8423–8444, Mar. 2021, doi: 10.1007/s11042-020-10035-z.

S. D. Muyco and A. A. Hernandez, “Least significant bit hash algorithm for digital image watermarking authentication,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Apr. 2019, pp. 150–154. doi: 10.1145/3330482.3330523.

S. Dhawan and R. Gupta, “Analysis of various data security techniques of steganography: A survey,” Information Security Journal, vol. 30, no. 2. Bellwether Publishing, Ltd., pp. 63–87, 2021. doi: 10.1080/19393555.2020.1801911.

M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Jun. 2019. doi: 10.1088/1757-899X/518/5/052003.

O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8, pp. 166589–166611, 2020, doi: 10.1109/ACCESS.2020.3022779.

G. Swain and S. K. Lenka, “A novel steganography technique by mapping words with LSB array,” International Journal of Signal and Imaging Systems Engineering, vol. 8, no. 1–2, pp. 115–122, 2015, doi: 10.1504/IJSISE.2015.067052.

O. Juarez-Sandoval, A. Fierro-Radilla, A. Espejel-Trujillo, M. Nakano-Miyatake, and H. Perez-Meana, “Cropping and noise resilient steganography algorithm using secret image sharing,” Sixth International Conference on Graphic and Image Processing (ICGIP 2014), vol. 9443, no. Icgip 2014, p. 94431S, 2015, doi: 10.1117/12.2179745.

M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process Image Commun, vol. 65, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.