1. Introduction
To ensure the security of a communication channel, messages transmitted between two subscribers are modified in such a way that their interception by a third party is impossible. Usually, such modification utilizes cryptography methods. In a general setting, the message is encoded with the help of some secret key, accessible only to the sender and the recipient. Receiving the original message from the encoded one is almost impossible without knowing the secret key. Accordingly, the analysis of data transmitted over an open communication channel does not allow a third party to freely read the original message [
1].
Steganography studies the confidential communication methods and is intended to hide the very existence of communication, unlike cryptography, which aims to make communication incomprehensible to those who do not have the necessary keys [
2].
The problem of steganographic analysis or stegoanalysis is an important component of building an integrated information security system. First of all, steganographic methods of information transfer are employed for hidden data transfer in various files carrying redundant data. In this vein, media files are typically used as containers. Here, image files are of the greatest interest for research since images are exchanged much more often compared to other types of media, e.g., audio. For example, users actively send images to each other in various instant messengers and social networks [
3].
In a general setting, a message can be confidentially transmitted via containers such as text, audio, video, image, and an executable file (program). Embedding a message into text can be carried out by replacing synonyms [
4]. Here, words in the source text are replaced with synonyms corresponding to the embedded message. As a result, the obtained text has the same meaning but already contains a hidden message.
Embedding messages into images is a common practice in steganography. Any picture is represented as a matrix of pixels, where each pixel is defined via an RGB triple. One way of embedding a message here is the so-called least significant bit (LSB) embedding method [
5,
6]. In this method, the least significant bit of a pixel’s color is replaced with a secret message. The use of this approach does not distort the visual perception of the image.
The rapid development of LSB embedding methods has given rise to the emergence of steganalysis methods for images, i.e., methods for detecting the fact of transmission of a secret message. To fight against detection, LSB injection is carried out not in all pixels but only in a subdomain of the image, and these pixels are selected in a pseudo-random manner.
2. Literature Review and Problem Statement
In this paper, we are considering a steganographic method using interpolation. The essence of interpolation is to use the available data to obtain expected values at unknown points.
Image interpolation is a very important branch in image processing and is widely used in the world of imaging, e.g., in 3D medical imaging to compensate for the lack of information in image reconstruction by modeling additional images between acquired 2D images [
7].
In [
8], Ki-Hyun Jung demonstrated a new interpolation method in data hiding. The proposed method of neighbor mean interpolation (NMI) is characterized by low time complexity and high computational speed, which is important when working with large images. The experimental results of the NMI algorithm show that the proposed method can embed a large number of secret data while maintaining very high visual quality where the peak signal-to-noise ratio (PSNR) is guaranteed to be higher than 35 dB, which is an excellent rate for a reversible data concealment method. Similarly, this method has the greatest capacity among other reversible data hiding ones and is comparable to other data hiding methods.
Yevsyutin et al. made an overview of the main algorithms for embedding information into digital images using interpolation and proposed the INMI algorithm’s modification. The overview also included a comparison of the algorithms in terms of PSNR and maximum capacity [
9].
As indicated in [
9], all of the algorithms for embedding information into digital images using interpolation are constructed similarly. The input is an
-sized image and a secret message representing a binary sequence. The stegocontainer image with the size
is formed from the original image using an interpolation algorithm.
Following [
9], let us consider two interpolation methods: NMI and INMI.
First, let us focus on the NMI method. In this algorithm, image interpolation is carried out in the following form: let
be the pixel value of the original image, then the pixel value of the container image
will be calculated in the following form (Equation (1)):
where
.
The pixel values of the image are calculated as follows. For each of the disjoint blocks with a size of 2 × 2 pixels, it is required to find the value of
by the formula (Equation (2)):
where
is the upper-left pixel of the block,
, after which the number of
bits that can be embedded in the block and its integer representation
is calculated, and the values of the corresponding pixels of the image are calculated.
Compared to INMI, the embedding capacity of NMI is less, while the quality of the resulting stegoimage is higher.
Now, let us consider the modified INMI method presented in [
9]. The method is based on the use of the Lagrange interpolation polynomial of the second degree to obtain the container image. The image obtained by adding additional rows and columns of pixels to the original image is considered as 5-pixel fragments, numbered from 0 to 4. In this setting, the pixel values of the container image are calculated as follows (Equation (3)):
where
is the pixel number in a fragment of five pixels.
As shown in [
9], the modified INMI method yields increase in the PSNR value with a slight decrease in the embedding capacity. In this article, we performed a stegoanalysis of the modified INMI method using some known algorithms. In general, this type of stegoanalysis can be applied to the whole class of interpolation methods.
3. Materials and Research Methods
This article aims to investigate the considered modification of the INMI method by conducting a steganalysis with available means. We use RS analysis as the primary method of image steganalysis in this study. This type of steganalysis allows us to obtain results comparable to the findings of Merzlyakova [
10]. RS analysis is based on the application of double statistics obtained from spatial correlations in images.
Currently, there are no studies analyzing the performance of such algorithms using stegoanalysis methods.
One of the preeminent methods of statistical stegoanalysis is the regular–singular (hereinafter referred to as RS) method, which was developed by Fridrich et al. in 2001 [
11,
12].
The RS analysis method serves to detect LSB embedding and uses a sensitive method of dual statistics derived from spatial correlations in the input images. In a general LSB picture, the matrix can be predicted to some extent from the matrices of the remaining 7 bits. Such a prediction becomes less reliable after embedding information in the least significant bits, as LSBs become random. This can be mathematically expressed and used to construct a sensitive and accurate stegoanalysis method. For high-quality images taken from a digital camera or scanner, RS analysis indicates that the safe capacitance is less than >0.005 bits per pixel.
The essence of the method is as follows: the entire image is divided into groups of n pixels
, where
n is even. For groups of pixels, the regularity function
is defined. By pixel value, we mean a number from 0 to 255.
The
function is called flipping and has the
property. Two flipping functions are defined:
, corresponding to the inversion of the least significant bit of the pixel, and
, which is the inversion with the transfer to the most significant bit:
When flipping is applied to a group, a transformed group of pixels is obtained. All groups of pixels are divided into classes as follows:
If then ;
If then ;
If then .
The RS method may indicate a small non-zero message length due to random deviations even for an empty container. This initial non-zero deviation can be either positive or negative and imposes a limit on the achievable accuracy of the RS analysis.
For each group, flipping is performed twice: with a direct and with an inverted mask. After carrying out classification operations for all groups, a number of quantitative characteristics are calculated:
The number of regular mask groups ;
The number of unusual groups for the mask ;
The number of regular groups for the inverse mask ;
The number of unusual groups for the inverse mask .
RS analysis shows more accurate results for messages that are distributed around the image, compared to the analysis of messages that are concentrated in a certain area of the image.
Figure 1 shows a typical RS-plot of
values versus the number of pixels with inverted LSB in the image (See
Figure 1).
Merzlyakova proposed methods for embedding messages in BMP files [
10] and carried out their RS analysis, which helped identify the stability of the various embedding algorithms.
4. Research Results
4.1. Conducting RS Analysis
To evaluate the modified INMI algorithm, we use the RS method offered by Yeltysheva et al. [
13]. The maximum amount of information that can be written to a container using the injection method is called the empirical capacity of the container. The parsing program of RS analysis yields the amount of embedded information (
) as a percentage of the empirical capacity of the container, which is calculated as in LSB embedding.
By the value of
L, one can judge whether the container is full or empty: at
≥ 5%, RS classifies the container as full. We also mention two hypotheses:
, meaning that the container contains a stegomessage, and an alternative hypothesis
, meaning that the container does not contain embedded information. The decision rule is that each container is assigned one of two hypotheses. Two types of errors are possible here: Type I error, which consists in establishing the hypothesis
when the container is empty, and Type II error, when the decision
is made when there is embedded information in the container. The scheme of experimental studies presented below shows the obtained results (See
Figure 2).
To conduct an RS analysis of this method, we needed to determine the capacity of containers in terms of the percentage of involvement of the least significant parts of the image matrix. It is paramount to compare the obtained results of steganalysis with the results of other embedding methods considered by Merzlyakova [
10].
Based on the modified INMI algorithm, we determine that the maximum container capacity is 21% and that it depends on the image contents.
After conducting a study on a set of 800 images of 225 × 225 size [
14], we concluded that 60 of them have the maximum capacity. The findings presented in
Table 1 display the RS analysis Type I errors on empty containers. In contrast with
Table 1, from the results of the RS analysis in
Table 2, one can conclude that the method is resistant to the RS analysis.
The findings of the stegoanalysis presented in
Table 1 and
Table 2 indicate that the percentage of embedded information detection using the proposed method is approximately equal to the percentage of files with Type I errors.
Accordingly,
Table 3 and
Table 4 present the results of the study of 60 pictures from the full set of 800 images, with an average filling percentage of 12% (See
Table 3 and
Table 4).
Apparently, the less information we embed in the image, the less likely it is that detectable features will appear as a result of the implementation process [
15]. As we see from the tables above, the modified INMI method is resistant to an RS attack as much as the stegosystem of the permutation method for raster images, described in [
10]. The percentage of change of the lower bits in the compared methods is approximately the same and differs in different implementations of the permutation stegosystem [
10]. Since the lower bits are not the only ones involved in the interpolation method, it makes sense to also analyze the compression ratio of empty and filled containers.
Consequently, sustainable implementation methods using interpolation are crucial for further development. Therefore, we plan to perform and study implementation methods using the Bezier curve.
4.2. Compression Ratio Analysis
It is acknowledged that the original container and the information added to it are statistically independent; therefore, when hidden data are added to the container, its size during compression increases compared to the size of the compressed initial empty container [
10]. Changes in the compression ratio in the opposite direction also indicate signs of change. Let us consider the study in which we will determine the compression ratios of empty and filled containers. The compression ratio is the main characteristic of the compression algorithm. It is defined as the ratio of the number of original uncompressed data to the number of compressed data.
Table 5 and
Table 6 show the results of comparing the compression ratios for empty and filled containers. Here,
is the sequence of data bytes of the empty container, and
is the compression ratio of the sequence
by the ZIP archiver.
is a sequence of data bytes of the filled container,
is the compression ratio of the
Y sequence by the RAR archiver, and
is the difference between the compression ratios of the segments of the
X and
Y sequences. For convenience, the part of the results are presented apart in the Tables below since they are monotonous for the entire selection of files (See
Table 5 and
Table 6).
5. Conclusions
There are various studies in the field on the topic of developing new algorithms for embedding information into graphics files, but it is the interpolation methods that we think have been incompletely investigated and need to be clarified. Our goal was to find out how the proposed methods are resistant to stegoanalysis.
The novelty of the proposed research is that image steganography methods using interpolation have not been previously subjected to stegoanalysis, and the studies cited in the literature do not reflect the stego-resistance of these methods in any way. Our studies help to determine the level of stegoanalysis robustness of the proposed methods.
We have implemented and investigated the notable INMI algorithm, or rather its best modification, and carried out stegoanalysis of this embedding method. The results obtained can be compared with the stegoanalysis of the methods considered by Merzlyakova.
Based on the examined INMI algorithm, we dispose that the maximum container capacity is 21% and depends on the image. Based on the results of a study on a set of 800 225 × 225 images, we determine that 60 of them have the maximum capacity. The above presented findings display the calculation of the Type I errors as 0%.
The findings of RS analysis are shown in
Table 2, where one may observe that the method is stable RS and comparable in resistance and capacity to the stoichiometry of the method of permutation for raster images, considered in the above mentioned studies. Additionally, the percentage of change of low-order bits in the compared methods is approximately the same and differs in different implementations of the stegosystem. Nevertheless, because the interpolation method involves not only low-order bits, we used a specific method to analyze the degree of compression in empty and filled containers.
The results of stegoanalysis were obtained on a set of photos with a certain amount of embedded information. If this amount is too small (less than 5% of the total data), the RS cannot be applied. Additionally, the input data for embedding must not have dependencies but must be a random sequence of bits, so the correlations used in the stegoanalysis method are not broken. The methods used are suitable for bmp raster images.
The above result can be used in further developments of information embedding methods using interpolation, to compare the effectiveness of embedding methods on attributes such as stego-resistance.
Likewise, in the study, we determined the compression ratios of empty and filled containers. The value of the differences in the coefficients obtained in this study is close to zero, which means the statistical structures of the empty and filled containers are similar.
Thence, we plan to develop sustainable steganographic methods for embedding information into raster files using other interpolation tools, as well as to analyze them using different approaches.