Skip to main content
Log in

Data hiding using pseudo magic squares for embedding high payload in digital images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel information hiding scheme based on pseudo magic squares is proposed. The pseudo magic square pattern is generated using the Knight’s move algorithm, whereas diamond encoding (DE) and adaptive pixel pair matching (APPM) embedding schemes adapts rhombic shaped and non-uniform pattern respectively. The momentous feature of the proposed embedding scheme is its ability to generate several pseudo magic squares for a given embedding parameter. On contrary, DE and APPM map one fixed pattern to an embedding parameter. Thus, the proposed system can achieve higher payloads by concealing data using a pattern chosen from a variety of compact neighborhood sets. Depending on the size of the message bits, the order of the pseudo magic square is determined and one pattern among the set of the possible pseudo magic squares can be utilized during the embedding phase. The secret digits are embedded in the cover image based on a randomized sequence. The performance analysis in the experimental results reveal that the proposed algorithm not only provides increased payload with less distortion but also increases the security of the embedding processing by allowing the application to employ one among the several square patterns for every secure communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Chao RM, Wu HC, Lee CC, Chu YP (2009) A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP J. Inf. Security. Article ID 658047

  2. Chang CC, Chou YC, Kieu TD (2008) An Information Hiding Scheme using Sudoku. in Proc. Third Int. Conf. Innovative Computing, Information and Control:17–22

  3. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90:727–752

    Article  MATH  Google Scholar 

  4. Chen J (2014) A PVD based Data Hiding Method with Histogram Preserving using Pixel Pair Matching. Signal Processing: Image Communication 29:375–384

    Google Scholar 

  5. Conaire C, O’Connor NE, Smeaton AF (2007) An Improved Spatiogram Similarity Measure for Robust Object Localization. In: in the proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)

  6. Hong W, Chen T-S (2012) A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security 1(7):176–184

    Article  Google Scholar 

  7. Hong W, Chen TS, Shiu CW (2008) A Minimal Euclidean distance Searching Technique for Suduko Steganography. in Proc. Int. Symp. Information Science and Engineering 1:515–518

    Google Scholar 

  8. Implementation of the SPAM features [Online]. Available:http://dde.binghamton.edu/download/spam/

  9. Kieu TD, Chang C-C (2011) A Steganographic Scheme by Fully Exploiting Modification Directions. Expert Systems with Applications 38:10648–1065

    Article  Google Scholar 

  10. Kim HJ, Kim C, Choi Y, Zhang X (2010) Improved Modification Direction Methods. Computers and Mathematics with Applications 60:319–325

    Article  MathSciNet  MATH  Google Scholar 

  11. Lalys F, Haegelen C, Ferre JC, El-Ganaoui O, Jannin P (2009) Construction and Assessment of a 3-T MRI Brain Template. Neuroimage

  12. Lee C-F, Chang C-C, Wang K-H (2008) An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy. Image and Vision Computing 26:1670–1676

    Article  Google Scholar 

  13. Li X, Zhang W, Gui X, Yang B (2013) A Novel Reversible Data Hiding Scheme based on Two-Dimensional Difference-Histogram Modification. IEEE Transactions on Information Forensics and Security 8(7):1091–1100

    Article  Google Scholar 

  14. Li B, He J, Huang J, Shi YQ (2011) A Survey on Image Steganography and Steganalysis. Int J Inf Hiding Multimed Signal Process 2:142–172

    Google Scholar 

  15. Lin YK (2012) High Capacity Reversible Data Hiding Scheme based upon Discrete Cosine Transformation. J Sys and Softw 85(10):2395–2404

    Article  Google Scholar 

  16. Liu Y, Chang C-C, Nguyen T-S (2015) High Capacity Turtle Shell-based Data Hiding. IET Image Processing 10(2):130–137

    Article  Google Scholar 

  17. Mali SN, Patrl PM, Jalnekar RM (2012) Robust and Secured Image Adaptive Data Hiding. Digital Signal Processing 22(2):314–323

    Article  MathSciNet  Google Scholar 

  18. Mielikainen J (2006) LSB Matching Revisited. IEEE Signal Process Letters 13 (5):285–287

    Article  Google Scholar 

  19. Netravali A, Haskell B (1988) Digital Pictures, Representation and Compression. Plenum Press

  20. Pevny T, Bas P, Fridrich J (2010) Steganalysis by Subtractive Pixel Adjacency Matrix,. IEEE Trans Inf Forensics Secur 5(2):215–224

    Article  Google Scholar 

  21. Provos N, Honeyman P (2003) Hide and Seek: An Introduction to Steganography. IEEE Secur Privacy 1:32–44

    Article  Google Scholar 

  22. RSP image database [Online]. Available: http://dud.inf.tu-dresden.de/westfeld/rsp/rsp.html

  23. Sabeti V, Samavi S, Mahdavi M, Shirani S (2010) Steganalysis and Payload Estimation of Embedding in Pixel differences using Neural Networks. Pattern Recognit 43:405–415

    Article  MATH  Google Scholar 

  24. Shen S-Y, Huang L-H (2015) A Data Hiding Scheme using Pixel Value Differencing and Improving Exploiting Modification Directions. Comput Secur 48:131–141

    Article  Google Scholar 

  25. Singh AK, Dave M, Mohan A (2014) Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT-DCT-SVD Domain. Nat Acad Sci Lett, Springer 37(4):351–358

    Article  Google Scholar 

  26. Singh AK, Kumar B, Dave M (2015) Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wirel Pers Commun Springer 80 (4):1415–1433

    Article  Google Scholar 

  27. Singh AK, Dave M, Mohan A (2015) Robust and Secure Multiple Watermarking in the Wavelet. Journal of Med Imaging and Health Informatics 5(2):406–414

    Article  Google Scholar 

  28. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple Watermarking on Medical Images using Selective Discrete Wavelet Transform Coefficients. J Med Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  29. Subhedar MS, Mankar VH (2014) Current Status and Key Issues in Image Steganography. A Survey, Comput Sci Rev 95:113

    MATH  Google Scholar 

  30. Tai W-L, Yeh C-M, Chang C-C (2009) Reversible Data Hiding based on Histogram Modification of Pixel Difference. IEEE Trans Circuits Sys Video Technol 19 (6):906–910

    Article  Google Scholar 

  31. Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack Modelling: Towards a Second Generation Benchmark. Signal Process 81(6):1177–1214

    Article  MATH  Google Scholar 

  32. Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo S-H (2010) An Improved Section-wise Exploiting Modification Direction Method. Signal Process 90:2954–2964

    Article  MATH  Google Scholar 

  33. Wang H, Wang S (2004) Cyber Warfare: Steganography vs. Steganalysis. ACM Commun 47:76–82

    Article  Google Scholar 

  34. Wu N-I, Hwang M-S (2007) Data Hiding: Current Status and Key Issues. Int J Netw Secur 4:1–9

    Google Scholar 

  35. Wu HZ, Wang HX, Zhao H (2015) Multi-layer Assignment Steganography using Graph-Theoretic Approach. Multimed Tools Appl 74(18):8171–8196

    Article  Google Scholar 

  36. Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Jennifer Ranjani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ranjani, J.J. Data hiding using pseudo magic squares for embedding high payload in digital images. Multimed Tools Appl 76, 3715–3729 (2017). https://doi.org/10.1007/s11042-016-3974-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3974-1

Keywords

Navigation