Abstract
In this paper, a novel information hiding scheme based on pseudo magic squares is proposed. The pseudo magic square pattern is generated using the Knight’s move algorithm, whereas diamond encoding (DE) and adaptive pixel pair matching (APPM) embedding schemes adapts rhombic shaped and non-uniform pattern respectively. The momentous feature of the proposed embedding scheme is its ability to generate several pseudo magic squares for a given embedding parameter. On contrary, DE and APPM map one fixed pattern to an embedding parameter. Thus, the proposed system can achieve higher payloads by concealing data using a pattern chosen from a variety of compact neighborhood sets. Depending on the size of the message bits, the order of the pseudo magic square is determined and one pattern among the set of the possible pseudo magic squares can be utilized during the embedding phase. The secret digits are embedded in the cover image based on a randomized sequence. The performance analysis in the experimental results reveal that the proposed algorithm not only provides increased payload with less distortion but also increases the security of the embedding processing by allowing the application to employ one among the several square patterns for every secure communication.
Similar content being viewed by others
References
Chao RM, Wu HC, Lee CC, Chu YP (2009) A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP J. Inf. Security. Article ID 658047
Chang CC, Chou YC, Kieu TD (2008) An Information Hiding Scheme using Sudoku. in Proc. Third Int. Conf. Innovative Computing, Information and Control:17–22
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90:727–752
Chen J (2014) A PVD based Data Hiding Method with Histogram Preserving using Pixel Pair Matching. Signal Processing: Image Communication 29:375–384
Conaire C, O’Connor NE, Smeaton AF (2007) An Improved Spatiogram Similarity Measure for Robust Object Localization. In: in the proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
Hong W, Chen T-S (2012) A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security 1(7):176–184
Hong W, Chen TS, Shiu CW (2008) A Minimal Euclidean distance Searching Technique for Suduko Steganography. in Proc. Int. Symp. Information Science and Engineering 1:515–518
Implementation of the SPAM features [Online]. Available:http://dde.binghamton.edu/download/spam/
Kieu TD, Chang C-C (2011) A Steganographic Scheme by Fully Exploiting Modification Directions. Expert Systems with Applications 38:10648–1065
Kim HJ, Kim C, Choi Y, Zhang X (2010) Improved Modification Direction Methods. Computers and Mathematics with Applications 60:319–325
Lalys F, Haegelen C, Ferre JC, El-Ganaoui O, Jannin P (2009) Construction and Assessment of a 3-T MRI Brain Template. Neuroimage
Lee C-F, Chang C-C, Wang K-H (2008) An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy. Image and Vision Computing 26:1670–1676
Li X, Zhang W, Gui X, Yang B (2013) A Novel Reversible Data Hiding Scheme based on Two-Dimensional Difference-Histogram Modification. IEEE Transactions on Information Forensics and Security 8(7):1091–1100
Li B, He J, Huang J, Shi YQ (2011) A Survey on Image Steganography and Steganalysis. Int J Inf Hiding Multimed Signal Process 2:142–172
Lin YK (2012) High Capacity Reversible Data Hiding Scheme based upon Discrete Cosine Transformation. J Sys and Softw 85(10):2395–2404
Liu Y, Chang C-C, Nguyen T-S (2015) High Capacity Turtle Shell-based Data Hiding. IET Image Processing 10(2):130–137
Mali SN, Patrl PM, Jalnekar RM (2012) Robust and Secured Image Adaptive Data Hiding. Digital Signal Processing 22(2):314–323
Mielikainen J (2006) LSB Matching Revisited. IEEE Signal Process Letters 13 (5):285–287
Netravali A, Haskell B (1988) Digital Pictures, Representation and Compression. Plenum Press
Pevny T, Bas P, Fridrich J (2010) Steganalysis by Subtractive Pixel Adjacency Matrix,. IEEE Trans Inf Forensics Secur 5(2):215–224
Provos N, Honeyman P (2003) Hide and Seek: An Introduction to Steganography. IEEE Secur Privacy 1:32–44
RSP image database [Online]. Available: http://dud.inf.tu-dresden.de/westfeld/rsp/rsp.html
Sabeti V, Samavi S, Mahdavi M, Shirani S (2010) Steganalysis and Payload Estimation of Embedding in Pixel differences using Neural Networks. Pattern Recognit 43:405–415
Shen S-Y, Huang L-H (2015) A Data Hiding Scheme using Pixel Value Differencing and Improving Exploiting Modification Directions. Comput Secur 48:131–141
Singh AK, Dave M, Mohan A (2014) Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT-DCT-SVD Domain. Nat Acad Sci Lett, Springer 37(4):351–358
Singh AK, Kumar B, Dave M (2015) Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wirel Pers Commun Springer 80 (4):1415–1433
Singh AK, Dave M, Mohan A (2015) Robust and Secure Multiple Watermarking in the Wavelet. Journal of Med Imaging and Health Informatics 5(2):406–414
Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple Watermarking on Medical Images using Selective Discrete Wavelet Transform Coefficients. J Med Imaging and Health Informatics 5(3):607–614
Subhedar MS, Mankar VH (2014) Current Status and Key Issues in Image Steganography. A Survey, Comput Sci Rev 95:113
Tai W-L, Yeh C-M, Chang C-C (2009) Reversible Data Hiding based on Histogram Modification of Pixel Difference. IEEE Trans Circuits Sys Video Technol 19 (6):906–910
Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack Modelling: Towards a Second Generation Benchmark. Signal Process 81(6):1177–1214
Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo S-H (2010) An Improved Section-wise Exploiting Modification Direction Method. Signal Process 90:2954–2964
Wang H, Wang S (2004) Cyber Warfare: Steganography vs. Steganalysis. ACM Commun 47:76–82
Wu N-I, Hwang M-S (2007) Data Hiding: Current Status and Key Issues. Int J Netw Secur 4:1–9
Wu HZ, Wang HX, Zhao H (2015) Multi-layer Assignment Steganography using Graph-Theoretic Approach. Multimed Tools Appl 74(18):8171–8196
Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781–783
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ranjani, J.J. Data hiding using pseudo magic squares for embedding high payload in digital images. Multimed Tools Appl 76, 3715–3729 (2017). https://doi.org/10.1007/s11042-016-3974-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3974-1