<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enhancing the steganographic resistance of hidden information to active attacks ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yurii Yaremchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Saliieva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Karpinets</string-name>
          <email>karpinets@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Nikolaienko</string-name>
          <email>andrey.nikolaienko.0@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Kunanets</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Bandera str., 79013 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Vinnytsia National Technical University</institution>
          ,
          <addr-line>95 Khmelnytsky Highway str., 21000 Vinnytsia</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>350</fpage>
      <lpage>355</lpage>
      <abstract>
        <p>With the rapid development of modern information technologies and systems, the number and complexity of threats aimed at breaching the security of confidential information transmitted secretly in multimedia files is increasing. At the same time, active attacks aimed at steganographic information protection systems are of great importance, as they differ from passive attacks in that the attacker not only tries to detect hidden information but can also modify the image to remove or distort it. Given the importance of this issue, the paper proposes to increase the resistance of hidden information in images to color gamutchanging attacks. To achieve this goal, the hiding algorithm has been improved based on the use of matrix filters to find the most suitable image areas and hide bits of information in them by correlating the average brightness of segments in blocks. The proposed algorithm includes many variable parameters, which makes it possible to adapt it to a wide range of images. In addition, flexible parameter settings enable improved information embedding and extraction accuracy. To validate the effectiveness of the enhanced algorithm, color-change attacks were conducted on an image containing embedded hidden information. Various steganalysis methods were also applied, including visual steganalysis, which reveals the least significant bit of the image; RS steganalysis, which estimates the approximate size of the hidden data; and a method analyzing the distribution of image elements on a plane to detect patterns, structures, or anomalies within the image. The obtained results demonstrate the robustness of the proposed method of information hiding to the selected steganalysis algorithms and to color gamut-changing attacks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;steganography</kwd>
        <kwd>concealment of information</kwd>
        <kwd>steganalysis</kwd>
        <kwd>active attack</kwd>
        <kwd>color gamut 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>With the rapid advancement of technology and
communications, it is becoming increasingly important to
protect confidential information from unauthorized access.
After all, transmitting a secret message over an unprotected
network channel poses a serious threat to its security.
Among the methods for solving this problem are
steganographic methods, which involve the open transport
of a secret message embedded in a container in advance [1].
However, there are many attacks aimed at breaking into
steganographic systems, including attacks that focus on
changing the color gamut in images, which can lead to the
disclosure of hidden information, violation of its
confidentiality and integrity. Therefore, this paper presents
a study related to increasing the resistance of hidden
information in images to these attacks. Thus, in this paper,
based on the analysis of known steganographic methods, it
is necessary to improve the algorithm for hiding
information using matrix filters and test it to prove its
resistance to steganalysis and color change attacks.</p>
      <p>In recent years, numerous studies have been conducted
on methods of hiding data in images based on the use of
algorithms for finding acceptable zones for hiding
information. For example, in their study [2], the authors
developed the Bald Eagle Search Optimal Pixel Selection
with Chaotic Encryption (BESOPS-CE) steganographic
image method based on the method of searching for optimal
pixels with chaotic encryption. The presented method
effectively hides the secret image in encrypted form under
the cover image. In this paper [3], a steganographic scheme
based on graph wavelet transformation using graph signal
processing (GSP) is proposed, which improves the visual
quality of a stego image. The authors of the paper [4]
presented a new steganographic approach in which the
algorithm of an extreme learning machine is modified to
create a supervised mathematical model. This algorithm is
first trained on a part of the image and then tested in
regression mode, which allows choosing the optimal place
to embed a message with the best values of the predicted
The next stage of the algorithm is to divide the resulting matrix
 and image  into blocks of size  х  , with the number of
blocks being  . For each block of the matrix 
a set of pixel
indices is defined by  , exceeding the threshold value. This
process begins by calculating the average value between the
blocks:
evaluation metrics. In this research [5], a new method was
proposed to increase the possibility of embedding secret
information in an image based on the edge region. The new
approach combines the Kenny and Pruitt edge detection
methods using a binary operation, and the secret message is
hidden using the least significant bit (LSB) method.</p>
      <p>An interesting idea is that of the authors of that paper
[6], who proposed an algorithm for encrypting private
images in combination with a new tent multi-dynamic
piecewise connected mapping lattice (TMDPCML) for
spatiotemporal chaotic systems. This algorithm extracts
private image information and uses distributed nonlinear
diffusion. Study [7] presents a method for detecting
steganographic changes in images using convolutional
neural networks. In [8], a new stenographic swarm
optimization technique with encryption for digital image
protection, called CSOES-DIS, was developed. The proposed
model applies the method of double chaotic digital image
encryption,
and
then
the
embedding
process
is
implemented. The authors of this paper [9] proposed a new
algorithm for encrypting and hiding triple images by
combining a 2D chaotic system, compressive sensing (CS),
and 3D discrete cosine transform (DCT).</p>
      <p>Data hiding methods that use areas of rapid changes in
an image to hide information have many advantages,
including high capacity, adaptability to different types of
images and data formats, and the ability to use both the
spatial and frequency characteristics of an image. However,
these methods are not very resistant to color gamut attacks,
which limits their effectiveness. In this regard, the paper
proposes an improvement that uses luminance correlation
and matrix filters to effectively hide information in images
while providing a high level of protection.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Main body</title>
      <p>Most algorithms that use areas of rapid changes in the
image to hide information use the method of hiding
information in one or two last bits of pixels of different
channels. These methods are called LSB and 2-LSB according
to the number of least significant bits [10]. However, these
algorithms cannot withstand color gamut attacks, so it is
worth improving an algorithm that will use luminance
correlation to embed bits of information in the image, which
will help to</p>
      <p>withstand color gamut attacks by using
luminance in areas that are most difficult to change.</p>
      <p>To increase the resistance to the above attacks, it is
proposed to use matrix filters to detect areas of sharp
transitions, which are expressed in the red and green
channels, while information is hidden in the blue channel.</p>
      <p>The proposed algorithm applies a filter using the
discrete Laplace operator [11], which can be represented in
two forms:</p>
      <p>=  ( + 1,  ) +  ( − 1,  ) +
+ ( ,  + 1) +  ( ,  − 1) − 4 ∗  ( ,  ),
0
1
0
1
1
−4
0
1 ,
0
where  ,  are indices in the cell of the selected pixel to
determine ∇  .
(1)
(2)
,
 = 1 …  ,  = 1 …  ,  = 1 …  ,
where ℎ is ith block with the average value between the pixels
of the blocks; 
 ; 
is the size of the block.</p>
      <p>is ith block from the red channel of the matrix
is ith block from the green channel of the matrix  ; 
Next, the set of indices is defined as follows  :</p>
      <p>= {( ,  )|ℎ ( ,  ) &gt;  },
where  is threshold value.</p>
      <p />
      <p>= {( ,  ), ( ,  ), … , ( ,  )},  = 1 …  ;
 is the length of the ith variable  .</p>
      <p>The next step is to split 
into indices corresponding to
the lower and upper parts of the block:
2


2
2
(3)
(4)
(5)
(6)
(7)
(8)

= { [ ]| [ ][1] &gt;</p>
      <p>,  = 1 …  },
 = { [ ]| [ ][1] ≤
,  = 1 …  },
where</p>
      <p>= {( ,  ), ( ,  ), … , ( ,  )},  = 1 …  —is
the set of lowercase indices of the part of the block from  ;
 = {( ,  ), ( ,  ), … , ( ,  )},  = 1 …  is the set of
upper indices of the part of the block from  ;  [ ] is value
 ,</p>
      <p>from іth block, and  [ ] [1] is value of  from the set
of indices from</p>
      <p>іth block.</p>
      <p>The last stage of preparation before embedding the
information is to calculate the average brightness of the pixels
in the blue channel of the image  for the pixels with the lower
and upper block indices:
,
,
where</p>
      <p>is the average brightness of the lower part of the
іth block by indices  ;</p>
      <p>is the average brightness of the
upper part of the іth block by indices  ;  [ ] is indices
 , 
 , 
of the lower part of the іth block;  [ ] is indices
the upper part of the іth block; 
is a block from
the blue image channel P, accordingly 
( [ ]) and</p>
      <p>( [ ]) are pixels from the top and bottom part of і-th
block for the specified indices  [ ] and  [ ].</p>
      <p>Thus, the preparation stage for hiding information in
the image takes place.</p>
      <p>Next, the embedding process is examined. Assuming a
sequence of bits W exists, to hide one bit of information, the
average brightness of the pixels at the calculated indices in
the lower and upper parts of the blue channel block of the
image must satisfy the conditions for embedding the bit.
Moreover, the smaller the embedding dimension, the more
intensively the pixel brightness will change, and vice versa.</p>
      <p>Example of conditions for hiding a single bit:</p>
      <p>If the condition for hiding a bit of information is not
met, the total brightness is correlated by increasing or
decreasing by a unit block of pixels whose indices belong to
the lower or upper threshold of the blue channel block. This
happens until the conditions for hiding the selected bit of
information are met. This is how information in the image
is hidden.</p>
      <p>We will develop algorithms that implement an
improved method of hiding information.</p>
      <p>Fig. 1 shows a general algorithm for embedding one bit
of information in one block.</p>
      <p>After determining the luminance values, a check is
performed to determine whether the bit has been embedded. If
this condition is not met, then the correlation value for the
lower and upper parts of the block is calculated, then the
At the same time, the general algorithm for extracting a bit of
information from a block is shown in Fig. 2.
( ∗  ) +  ≤ 
(1 ∗  ) +  ≤ 
(3 ∗  ) +  ≤ 
( ∗  ) +  ≤ 
≤ ( + 1 ) ∗ 
≤ (1 + 1) ∗ 
− 
∧,
≤ ( + 1 ) ∗ 
−  ,
brightness for these parts of the block is correlated and the
brightness value is calculated. This process is repeated
cyclically until the desired values are selected and the condition
is fully met.
3. Experimental research
The security of the proposed algorithm was analyzed by
performing color change attacks on the image in which the
hidden information was embedded.</p>
      <p>To determine the effectiveness of the algorithm’s
protection against such attacks, the values of 
, are
calculated, reflecting the correspondence between the
embedded hidden information  and the extracted hidden
information  ∗
obtained:



=
100%,
(9)
where</p>
      <p>is the number of equal bits in both messages;  is
the size of the hidden message in bits.</p>
      <p>Value of</p>
      <p>indicates the success of extracting hidden
information from the image.</p>
      <p>More than 100 different images were selected for the
experiment, most of which are detailed full-color images
with a sufficient number of contrast transitions and
monotonous areas.
attacks that altered the color scheme: making it brighter,
more contrasted, and darker, closer to grayscale.
Thus, minor changes in different image channels were
detected, but these values cannot indicate the presence or
absence of hidden information in the container or the
original.</p>
      <p>Let’s conduct additional testing of the algorithm,
focusing on the analysis of the distribution of image
elements on the plane (Fig. 7).
If the points are randomly distributed over the entire area,
the sequence elements are independent, which is typical for
containers with embedded data. If the container is not filled,
then an uneven distribution of points on the field will be
observed. Since the container did not show a chaotic
arrangement of points, this method was unable to recognize
that the container contained hidden information.</p>
      <p>Thus, according to the results of the study, it can be
assumed that the proposed method of hiding information is
resistant to the described steganalysis algorithms and to
color change attacks.</p>
    </sec>
    <sec id="sec-3">
      <title>4. Conclusions</title>
      <p>In this work, the information-hiding algorithm is improved
by using matrix filters to identify the most suitable areas in
the image and embed information bits into them. This is
achieved by varying the brightness of segments in image
blocks, which are consistently changed to hide bits of
information. The main feature of the proposed algorithm is
its high resistance to color gamut attacks, achieved by
embedding bits by changing the average brightness of the
selected hiding zones. Due to the large number of variable
parameters, another significant advantage of the improved
algorithm can be identified, namely the flexibility of
settings, which allows the algorithm to be adapted to
different types of images.</p>
      <p>In addition, the study presents the algorithm of the
program in the form of flowcharts, which is an important
step in testing the improved algorithm for resistance to
active attacks. The results of the testing indicate high
resistance to color gamut attacks on bright colors and
above-average resistance to grey gamut attacks. Also,
during the testing, resistance to steganalysis by visual
methods, RS method, and the method of analyzing the
distribution of the image on the plane was revealed.</p>
      <p>
        Thus, based on the proposed improvement of the
algorithm, the steganographic resistance of hidden
information in images to active attacks was increased.
with Multi Dynamic Coupling Coefficient, Inf. Sci. 569
(2021) 217–240. doi: 10.1016/j.in
        <xref ref-type="bibr" rid="ref1">s.2021</xref>
        .04.013.
[7] D. Denysiuk, et. al., Method for Detecting
Steganographic Changes in Images using Machine
Learning, in: 13th International Conference on
Dependable Systems, Services
        <xref ref-type="bibr" rid="ref2">and Technologies
(DESSERT) (2023</xref>
        ) 1–6. doi:
10.1109/DESSERT61349.2023.10416453.
[8] A. A. Eshmawi, et al., Competitive Swarm
Optimization with Encryption based Steganography
for Digital Image Security, Comput. Mater. Contin.
72(2) (2022) 4173–4184. doi:
10.32604/cmc.2022.028008.
[9] X. Wang, C. Liu, D. Jiang, A Novel Triple-Image
Encryption and Hiding Algorithm based on Chaos,
Compressive Sensing and 3D DCT, Inf. Sci. 574 (2021)
505–527. doi: 10.1016/j.in
        <xref ref-type="bibr" rid="ref1">s.2021</xref>
        .06.032.
[10] J. T. Tarigan, D. I. Putra, Implementation of
Steganography Modified Least Significant Bit using
the Columnar Transposition Cipher and Caesar
Cipher Algorithm in Image Insertion, Journal of
Physics: Conference Series 1898(1) (2021). doi:
10.1088/1742-6596/1898/1/012003.
[11] Discrete Laplacian, Medium (2024). URL:
https://hilbert-cantor.medium.com/discretelaplacian-8a5dde7ff001
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Buchyk</surname>
          </string-name>
          , et al.,
          <source>Improvement of Steganographic Methods based on the Analysis of Image Color Models, in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>117</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bahaddad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Almarhabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abdel-Khalek</surname>
          </string-name>
          ,
          <article-title>Image Steganography Technique based on Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption, Alexandria Eng</article-title>
          . J.
          <volume>7</volume>
          (
          <issue>5</issue>
          ) (
          <year>2023</year>
          )
          <fpage>41</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.aej.
          <year>2023</year>
          .
          <volume>05</volume>
          .051.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>V. K. Sharma</surname>
            ,
            <given-names>D. K.</given-names>
          </string-name>
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Mathur</surname>
          </string-name>
          ,
          <article-title>Efficient Image Steganography using Graph Signal Processing</article-title>
          ,
          <source>IET Image Process</source>
          .
          <volume>12</volume>
          (
          <issue>6</issue>
          ) (
          <year>2018</year>
          )
          <fpage>1065</fpage>
          -
          <lpage>1071</lpage>
          . doi:
          <volume>10</volume>
          .1049/iet-ipr.
          <year>2017</year>
          .
          <volume>0965</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Atee</surname>
          </string-name>
          , et. al.,
          <source>Extreme Learning Machine based Optimal Embedding Location Finder for Image Steganography</source>
          ,
          <source>PLoS ONE 12(2)</source>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1371/journal.pone.
          <volume>0170329</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Mohsin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Alameen</surname>
          </string-name>
          ,
          <article-title>A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection</article-title>
          ,
          <source>Cybernetics and Information Technologies</source>
          <volume>21</volume>
          (
          <issue>3</issue>
          ) (
          <year>2021</year>
          )
          <fpage>97</fpage>
          -
          <lpage>107</lpage>
          . doi:
          <volume>10</volume>
          .2478/cait2021-
          <fpage>0032</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>