Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 14, pp 19045–19059 | Cite as

Extended squared magic matrix for embedding secret information with large payload

  • Xiao-Zhu Xie
  • Yanjun LiuEmail author
  • Chin-Chen Chang
Article
  • 63 Downloads

Abstract

Data hiding is a technology designed for safely transmitting secret data through open communication channels, in which the secret data are embedded into a cover carrier imperceptibly. Among the existing data hiding schemes, the exploiting-modification-direction (EMD) based schemes draw considerable attentions due to large embedding capacity. The proposed scheme improves the EMD-2 scheme by constructing an extended squared magic matrix, resulting in a larger embedding capacity high up to 3.15 bits per pixel (bpp). Experimental results show that the proposed scheme outperforms state-of-the-art reference matrix based schemes in terms of embedding capacity, meanwhile, maintains good image quality.

Keywords

Data hiding High capacity EMD-2 Extended squared magic matrix 

Notes

Acknowledgements

This work is supported by Education and Scientific Research Project of Fujian Province under Grant JT180436, Xiamen Science and Technology Planning Project under Grant 3502Z20183058 and Open Fund of Engineering Research Center for Software Testing and Evaluation of Fujian Province.

References

  1. 1.
    Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336CrossRefGoogle Scholar
  2. 2.
    Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786CrossRefGoogle Scholar
  3. 3.
    Chang C C, Chou Y C, Kieu T D (2008) An information hiding scheme using Sudoku. In Proceedings of the Third International Conference on Innovative Computing, Information and Control (Dalian, China, June 18–20, 2008):17–22Google Scholar
  4. 4.
    Chang CC, Kieu TD, Wu WC (2009) A loss-less data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597–1603CrossRefzbMATHGoogle Scholar
  5. 5.
    Chang C C, Liu Y, Nguyen T S (2014) A novel turtle shell based scheme for data hiding. In Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (Kitakyushu, Japan, August 27–29, 2014): 89–93Google Scholar
  6. 6.
    Davis RM (1978) The data encryption standard in perspective. IEEE Commun Soc Mag 16(6):5–9CrossRefGoogle Scholar
  7. 7.
    Hu YC (2006) High capacity image hiding scheme based on vector quantization. Pattern Recogn 39(9):1715–1724CrossRefzbMATHGoogle Scholar
  8. 8.
    Huang F, Qu X, Kim HJ, Huang J (2016) Reversible data hiding in JPEG images. IEEE Trans Circuits Syst Video Technol 26(9):1610–1621CrossRefGoogle Scholar
  9. 9.
    Ker AD (2004) Improved detection of LSB steganography in grayscale images. Proc Inform Hiding Workshop 3200:97–115CrossRefGoogle Scholar
  10. 10.
    Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction schemes. Comput Math Appl 60(2):319–325MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Liu Y, Chang CC, Nguyen TS (2016) High capacity turtle shell-based data hiding. IET Image Process 10(2):130–137CrossRefGoogle Scholar
  12. 12.
    Liu Y, Chang C C, Huang P C (2017) Extended exploiting-modification-direction data hiding with high capacity. 2017 International Conference on Video and Image Processing (Singapore, Dec. 27–29, 2017): 151–155Google Scholar
  13. 13.
    Liu Y, Chang CC, Huang PC (2018) Efficient information hiding based on theory of numbers. Symmetry 10(1):19CrossRefzbMATHGoogle Scholar
  14. 14.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Proc Lett 13(5):285–287CrossRefGoogle Scholar
  15. 15.
    Qin C, Chang CC, Hsu T (2015) Reversible data hiding scheme based on exploiting modification direction with two Steganographic images. Multimed Tools Appl 74(15):5861–5872CrossRefGoogle Scholar
  16. 16.
    Rivest R, Shamir A, Adleman L (1978) A scheme for obtaining digital signature and public key cryptosystems. Commun ACM 21(2):120–126CrossRefzbMATHGoogle Scholar
  17. 17.
    Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Engineering Research Center for Software Testing and Evaluation of Fujian ProvinceXiamen University of TechnologyXiamenChina
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungRepublic of China

Personalised recommendations