Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3715–3729 | Cite as

Data hiding using pseudo magic squares for embedding high payload in digital images

  • J. Jennifer Ranjani


In this paper, a novel information hiding scheme based on pseudo magic squares is proposed. The pseudo magic square pattern is generated using the Knight’s move algorithm, whereas diamond encoding (DE) and adaptive pixel pair matching (APPM) embedding schemes adapts rhombic shaped and non-uniform pattern respectively. The momentous feature of the proposed embedding scheme is its ability to generate several pseudo magic squares for a given embedding parameter. On contrary, DE and APPM map one fixed pattern to an embedding parameter. Thus, the proposed system can achieve higher payloads by concealing data using a pattern chosen from a variety of compact neighborhood sets. Depending on the size of the message bits, the order of the pseudo magic square is determined and one pattern among the set of the possible pseudo magic squares can be utilized during the embedding phase. The secret digits are embedded in the cover image based on a randomized sequence. The performance analysis in the experimental results reveal that the proposed algorithm not only provides increased payload with less distortion but also increases the security of the embedding processing by allowing the application to employ one among the several square patterns for every secure communication.


Data hiding Pseudo magic square Steganography High payload 


  1. 1.
    Chao RM, Wu HC, Lee CC, Chu YP (2009) A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP J. Inf. Security. Article ID 658047Google Scholar
  2. 2.
    Chang CC, Chou YC, Kieu TD (2008) An Information Hiding Scheme using Sudoku. in Proc. Third Int. Conf. Innovative Computing, Information and Control:17–22Google Scholar
  3. 3.
    Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90:727–752CrossRefMATHGoogle Scholar
  4. 4.
    Chen J (2014) A PVD based Data Hiding Method with Histogram Preserving using Pixel Pair Matching. Signal Processing: Image Communication 29:375–384Google Scholar
  5. 5.
    Conaire C, O’Connor NE, Smeaton AF (2007) An Improved Spatiogram Similarity Measure for Robust Object Localization. In: in the proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)Google Scholar
  6. 6.
    Hong W, Chen T-S (2012) A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security 1(7):176–184CrossRefGoogle Scholar
  7. 7.
    Hong W, Chen TS, Shiu CW (2008) A Minimal Euclidean distance Searching Technique for Suduko Steganography. in Proc. Int. Symp. Information Science and Engineering 1:515–518Google Scholar
  8. 8.
    Implementation of the SPAM features [Online]. Available:
  9. 9.
    Kieu TD, Chang C-C (2011) A Steganographic Scheme by Fully Exploiting Modification Directions. Expert Systems with Applications 38:10648–1065CrossRefGoogle Scholar
  10. 10.
    Kim HJ, Kim C, Choi Y, Zhang X (2010) Improved Modification Direction Methods. Computers and Mathematics with Applications 60:319–325MathSciNetCrossRefMATHGoogle Scholar
  11. 11.
    Lalys F, Haegelen C, Ferre JC, El-Ganaoui O, Jannin P (2009) Construction and Assessment of a 3-T MRI Brain Template. NeuroimageGoogle Scholar
  12. 12.
    Lee C-F, Chang C-C, Wang K-H (2008) An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy. Image and Vision Computing 26:1670–1676CrossRefGoogle Scholar
  13. 13.
    Li X, Zhang W, Gui X, Yang B (2013) A Novel Reversible Data Hiding Scheme based on Two-Dimensional Difference-Histogram Modification. IEEE Transactions on Information Forensics and Security 8(7):1091–1100CrossRefGoogle Scholar
  14. 14.
    Li B, He J, Huang J, Shi YQ (2011) A Survey on Image Steganography and Steganalysis. Int J Inf Hiding Multimed Signal Process 2:142–172Google Scholar
  15. 15.
    Lin YK (2012) High Capacity Reversible Data Hiding Scheme based upon Discrete Cosine Transformation. J Sys and Softw 85(10):2395–2404CrossRefGoogle Scholar
  16. 16.
    Liu Y, Chang C-C, Nguyen T-S (2015) High Capacity Turtle Shell-based Data Hiding. IET Image Processing 10(2):130–137CrossRefGoogle Scholar
  17. 17.
    Mali SN, Patrl PM, Jalnekar RM (2012) Robust and Secured Image Adaptive Data Hiding. Digital Signal Processing 22(2):314–323MathSciNetCrossRefGoogle Scholar
  18. 18.
    Mielikainen J (2006) LSB Matching Revisited. IEEE Signal Process Letters 13 (5):285–287CrossRefGoogle Scholar
  19. 19.
    Netravali A, Haskell B (1988) Digital Pictures, Representation and Compression. Plenum PressGoogle Scholar
  20. 20.
    Pevny T, Bas P, Fridrich J (2010) Steganalysis by Subtractive Pixel Adjacency Matrix,. IEEE Trans Inf Forensics Secur 5(2):215–224CrossRefGoogle Scholar
  21. 21.
    Provos N, Honeyman P (2003) Hide and Seek: An Introduction to Steganography. IEEE Secur Privacy 1:32–44CrossRefGoogle Scholar
  22. 22.
    RSP image database [Online]. Available:
  23. 23.
    Sabeti V, Samavi S, Mahdavi M, Shirani S (2010) Steganalysis and Payload Estimation of Embedding in Pixel differences using Neural Networks. Pattern Recognit 43:405–415CrossRefMATHGoogle Scholar
  24. 24.
    Shen S-Y, Huang L-H (2015) A Data Hiding Scheme using Pixel Value Differencing and Improving Exploiting Modification Directions. Comput Secur 48:131–141CrossRefGoogle Scholar
  25. 25.
    Singh AK, Dave M, Mohan A (2014) Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT-DCT-SVD Domain. Nat Acad Sci Lett, Springer 37(4):351–358CrossRefGoogle Scholar
  26. 26.
    Singh AK, Kumar B, Dave M (2015) Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wirel Pers Commun Springer 80 (4):1415–1433CrossRefGoogle Scholar
  27. 27.
    Singh AK, Dave M, Mohan A (2015) Robust and Secure Multiple Watermarking in the Wavelet. Journal of Med Imaging and Health Informatics 5(2):406–414CrossRefGoogle Scholar
  28. 28.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple Watermarking on Medical Images using Selective Discrete Wavelet Transform Coefficients. J Med Imaging and Health Informatics 5(3):607–614CrossRefGoogle Scholar
  29. 29.
    Subhedar MS, Mankar VH (2014) Current Status and Key Issues in Image Steganography. A Survey, Comput Sci Rev 95:113MATHGoogle Scholar
  30. 30.
    Tai W-L, Yeh C-M, Chang C-C (2009) Reversible Data Hiding based on Histogram Modification of Pixel Difference. IEEE Trans Circuits Sys Video Technol 19 (6):906–910CrossRefGoogle Scholar
  31. 31.
    Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack Modelling: Towards a Second Generation Benchmark. Signal Process 81(6):1177–1214CrossRefMATHGoogle Scholar
  32. 32.
    Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo S-H (2010) An Improved Section-wise Exploiting Modification Direction Method. Signal Process 90:2954–2964CrossRefMATHGoogle Scholar
  33. 33.
    Wang H, Wang S (2004) Cyber Warfare: Steganography vs. Steganalysis. ACM Commun 47:76–82CrossRefGoogle Scholar
  34. 34.
    Wu N-I, Hwang M-S (2007) Data Hiding: Current Status and Key Issues. Int J Netw Secur 4:1–9Google Scholar
  35. 35.
    Wu HZ, Wang HX, Zhao H (2015) Multi-layer Assignment Steganography using Graph-Theoretic Approach. Multimed Tools Appl 74(18):8171–8196CrossRefGoogle Scholar
  36. 36.
    Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781–783CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of ComputingSASTRA UniversityThanjavurIndia

Personalised recommendations