Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial
- 81 Downloads
In this paper, a new reversible data hiding scheme has been proposed using lagrange’s interpolating polynomial on interpolated sub-sampled images. First, we generate sub-sampled images from original image and enlarge its size using image interpolation. Now, we convert secret message using lagrange interpolating polynomial and generate new secret message. The new secret message is divided and stored within interleaved pixel of each interpolated sub-sampled images. At the receiver end, new secret message is extracted from interleaved pixel of each sub-sampled stego images and then lagrange’s interpolation is applied to generate original secret message. The security has been enhanced due to the distributive nature of hidden data within multiple images. The original pixels are not effected during data embedding which assure reversibility. The proposed scheme provides average embedding capacity with good visual quality measured by peak signal to noise ratio (PSNR) which is greater than 50 dB. It is observed that the proposed scheme provides better performance than other existing data hiding schemes in terms of data embedding capacity, visual quality and security. We have analyzed our stego images through RS analysis, calculate relative entropy, standard deviation and correlation coefficient of original and stego image to show the robustness under various steganographic attacks.
KeywordsSteganography Sub-sampled image Reversible data hiding Lagrange interpolation Image interpolation RS analysis Relative entropy
The author is grateful to the anonymous reviewers for their invaluable comments and recommendations to improve our paper. This work is supported by UGC Innovative project grant under Vidyasagar University (Grant Nos: VU/Innovative/ Sc/06/2015, Dated: 17.06.2015).
- 4.Fridrich J, Goljan J, Du R (2001) Invertible authentication. In: Proceedings of the SPIE, security and watermarking of multimedia contents, vol 4314. SanJose, pp 197208Google Scholar
- 5.Giri D, Jana B, Mondal SK (2016) Dual image based reversible data hiding scheme using three pixel value difference expansion Information systems design and intelligent applications. Springer, India, pp 403–412Google Scholar
- 6.Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. International workshop on digital watermarking, lecture notes in computer science, vol 4283. Springer, Jeju Island, p 348361Google Scholar
- 8.Jana B, Giri D, Mondal SK (2016) Dual image based reversible data hiding scheme using (7, 4) hamming code. Multimed Tools Appl 1–23Google Scholar
- 10.Kuo WC, Jiang DJ, Huang YC (2007) Reversible data hiding based on histogram. International conference on intelligent computing, lecture notes in artificial intelligence, vol 4682. Springer, Qing Dao, pp 11521161Google Scholar
- 11.Lee CF, Chang CC, Gao CY (2013) A two-staged multi-level reversible data hiding exploiting lagrange interpolation. In: 2013 Ninth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 485–488Google Scholar
- 17.Varsaki E, Fotopoulos V, Skodras AN (2006) A reversible data hiding technique embedding in the image histogram. Technical Report HOU-CS-TR-2006-08-GR Hellenic Open UniversityGoogle Scholar