1 Introduction

Machine learning is a critical technology in computer science which contains pattern recognition [1], image matching [2], data hiding [3] and so on. Data hiding has been extensively used in the fields of fingerprint, authentication, ownership fortification and furtive communication. The focal objective of data hiding is to write the secret data into the host media (called cover media), i.e., image, video, audio, and text. In recent years, countless data hiding techniques have been introduced and mostly are irreversible data hiding [4]. Irreversible data hiding, the cover image is absolutely damaged and cannot be renovated after extraction. Reversible data hiding (RDH) recover embedded secret information from stego image that is used in medical imaging [5], image authentication [6, 7], military image [3], satellite image [4], multimedia archive management [8] and data coloring in cloud [9]. Two vital requirements of the RDH scheme is to preserve the worth of image and provide excessive embedding capacity (EC).

RDH [10,11,12], intentions to inscribe secret information and slightly variates pixel value of original media to entirely recover from marked image. RDH [10, 11, 13,14,15] has been distributed into three realms, i.e., spatial domain, frequency domain and compressed domain [16]. The spatial domain has been further categorized into LSB substitution [13], histogram shifting (HS) [11, 17,18,19,20], and difference expansion (DE) [10, 13, 14, 16, 21, 22]. In 2003, Tian et al. [10] premeditated the variance among two neighbor pair of pixels to embed the information. Thodi and Rodriguez [16] adapted an expansion technique based on error prediction to envisage the pixel value. In 2006, Ni et al. [17] presented the histogram shifting method to get high PSNR, but low EC. In 2009, Tai et al. [19] proposed the binary tree structure to discover the peak point that is used to write data. Kim et al. [11] employed center pixel as the reference pixel to reckon the difference of sub-image conversely, but center pixel cannot be used to hide the information. Luo et al. [13] enhanced Kim’s technique, but the reference pixel does not hold the data. In 2010, Li et al. [18] designed the variation among neighbor pixel based on HS. In 2011, Hong and Chen [23] divided the host image into two blocks, but data write in only the smooth block region. In 2013, Huang et al. [24] enhanced EC to amend Hong and Chen techniques. Lin et al. [25] planned multilevel hiding procedure to obtain greater EC and better PSNR. Tsai et al. [26] combined HS and predictive coding (PC) to examine the elementary pixel in every block of residual image, but needed more space to record extra informations.

There were some foremost problems with preceding techniques. RDH having great performance on DE and HS techniques to retain location map, extraction information, image restoration and overflow/underflow problems [17]. Extra bits will increase when smallest point is used to substitute for zero point because location and value for every smallest point is recoded, which consumes significant amount of EC for achieving lossless recovery [27]. HS does not work on equal histogram bins of an image and numerous sets of peak points can be employed for hiding information. Previously when EC increased the PSNR decreased, while EC is decreased PSNR is increased on blocks but it is time consuming to consider block that have minimum number of zero point to shift histogram. The key motivation is to sustain the stability among the EC and image PSNR and only consider those blocks that have zero point and otherwise contravene those blocks in the embedding process.

In this paper, we have proposed a new technique for reversible data hiding based on efficient compressed domain with multiple bit planes (CDMBP). A collective approach of RDH is to delimit a free hiding space then we write the information in an image; consequently, we persuaded the properties of pre-reserving space for data embedding based on efficient compressed domain that play a vital role in data embedding for the reason that they make available additional space for data embedding, because low compression ratio cannot provide much space for the embedded region to control extra bits that increase during small block division and cannot be accommodated into embedded regions. Therefore, the EC graph deteriorates on small blocks size. Furthermore, the possession of multiple bit planes extraction of individual pixels to construct a new image is induced and the overflow/underflow problem is overcome at the same time to escalate the hiding capacity to the extreme level and preserve the high quality of the marked image. We ascertained the probability of peak and zero point to improve the hiding capacity in each non-overlapping blocks in the cover image. The rest of this paper is structured as follows. Section 2 describes the earlier techniques. Section 3 conveys an explanation of the proposed hiding method, provides the testing results in Sect. 4 and concludes the observations in Sect. 5.

2 Related work

2.1 Ni et al.’s method

In Ni et al. [17], an embedded process, the algorithm first scansthe whole image to find the peak point (PP) (extreme occurrence of pixels assume) and ZP (lowest pixel assume) based on the strength of pixels in the histogram.

$$\begin{aligned} H\left( G^{'}_{(x,y)} \right) =H\left( G_{(x,y)} \right) +1, \end{aligned}$$
(1)

where \(H(G^{'}_{(x,y)})\) is the modified grayscale value,

$$\begin{aligned} G^{'}_{(x,y)}= {\left\{ \begin{array}{ll} {G_{(x,y)}+1},&{} \mathrm{{if}} \quad PP<G_{(x,y)}<ZP,\\ G_{(x,y)}+m, &{} \mathrm{{if}} \quad G_{(x,y)} = PP,\\ G_{(x,y)}, &{} \mathrm{otherwise}. \end{array}\right. } \end{aligned}$$
(2)

\(G_{(x,y)}\) is the original pixel grayscale value and m is secret information. If \(G_{(x,y)}\) pixel value is amid PP and ZP formerly, all pixels \(G_{(x,y)}\) will be shifted one step closer toward the ZP. If \(G_{(x,y)}\) is equivalent to PP, then secret data m will be written in that pixel place. The value of pixels will be unchanged if \(G_{(x,y)}\) pixel value is not among PP and ZP. The number of each pixel corresponds to the number of pixels which are linked with PP, for example, the peak-point \(PP=1\) and the zero-point \(ZP=9\). The entire image is scanned from top to bottom and right to left; furthermore, fluctuating the histogram \((1-9)\) grayscale values by one step in the right-hand side and leaving vacant 1 grayscale value visible in Fig. 1, the pixel value \(G_ {(0, 1)} =1\) is identical to PP its mean and that pixel value can be set for the secret message.

Fig. 1
figure 1

Original histogram of G(xy)

Fig. 2
figure 2

a Block division of “Lena”; b Histogram of image “Lena” for each block

Ni et al.’s scheme EC of image “Lena” is 2787 pixels which can be used to implant the information; however, it cannot provide an adequate free space. Thus, several couples of the least and utmost PP and ZP are needed to embed data and need to conserve the spare information like the value of PP, ZP and location information of overflow/underflow pixels.

2.2 Kim et al.’s method

The author achieved high embedding capacity in adjacent pixels by means of high spatial associations. The described data embedding algorithm is as follows.

input cover image D size \(x \times y\) output stego image D.

Step 1. Using Eq. (3), the cover image allocated to many sub-image equals size \(D_{1}, D_{2}, D_{3},\ldots D_{\varDelta ^{}}\)

$$\begin{aligned} D_{s}(i, j)= D\left( i. \varDelta + \lfloor { \frac{S-1}{\varDelta } \rfloor } , j. \varDelta + (( S-1) \mathrm{mod} \varDelta ) \right) . \end{aligned}$$
(3)

The sub-image rows and columns are denoted by (I, j), while intervals of sub-sampling is \(m/ \varDelta = 1,2 ,\ldots , n/ \varDelta .\varDelta \)

Step 2. Compute the difference image and sub-image selected as reference image in Eq. (4) \( dS (i,j)(s\,{\ne }\, \mathrm{{reference}}\)-image(r)).

$$\begin{aligned} d_{S}(i, j)= D_S(i,j) -r(i,j) (S= 1,2,\ldots ,\varDelta ^{2} , S\ne r. \end{aligned}$$
(4)

Step 3. Histogram shifting using Eq. (5).

$$\begin{aligned} d^{'}_{S}(i, j)= {\left\{ \begin{array}{ll} d_{S}(i, j) + L+1, \quad \mathrm{{if}} \quad d_{S}(i, j) \ge L+1\\ d_{S}(i, j) - L-1, \quad \mathrm{{if}} \quad d_{S}(i, j) \le - L-1\\ d_{S}(i, j) , \quad \mathrm{{otherwise}} \end{array}\right. }. \end{aligned}$$
(5)

Step 4. Altering the histogram to embed the secret bit b using Eq. (6).

$$\begin{aligned} d^{''}_{S}(i, j)= {\left\{ \begin{array}{ll} d^{'}_{S}(i, j) + L+b, \quad \mathrm{{if}} \quad d^{'}_{S}(i, j) = L\ne 0 \\ d^{'}_{S}(i, j) - L-b, \quad \mathrm{{if}} \quad d^{'}_{S}(i, j) = - L\ne 0\\ d^{'}_{S}(i, j)+ b , \quad \mathrm{{if}} \quad d^{'}_{S}(i, j) = - L= 0 \end{array}\right. }. \end{aligned}$$
(6)

Step 5. Using Eq. (7) compute marked sub-image.

$$\begin{aligned} D^{'} _{s}(i, j)= D_{r}(i,j) + D^{''} _{s}(i, j). \end{aligned}$$
(7)
Fig. 3
figure 3

Cover image division

Fig. 4
figure 4

Extra bit structure

2.3 Che et al.’s method

Fallahpour et al.’s [28] block division method evolved the EC of Ni et al.’s method. Kuo et al. [29] further distributed the cover image into four blocks size of \(512 \times 512\). Che-Wei Lee [30] divided the cover image into supplementary sub-blocks \(256 \times 256\) to \(2 \times 2\), \(256 \times 256\) to \(8 \times 8\), and \(4 \times 4\) to \(2 \times 2\) shown in Fig. 2. The authors [13, 31] by mentioning the median value of each block, embedded the secret data to produce the difference histogram among a high block of pixel correlation. Block division effectively enriched the EC, since the whole capacity of data can be hidden in numerous blocks and is typically more than the single block. In the study, EC growth increased by block division, but all EC was contingent upon zero point [32].

In Liu et al. [27], the hiding rate is escalated by the division of image from \(256 \times 256\) ,\(16 \times 16\) , \(8 \times 8\), \(2 \times 2,\) but PSNR persistently decreased from the size of \(256 \times 256\) to \(2 \times 2\) blocks division.

3 The proposed method

Liu et al. [27] take out the n-bit planes from 8-bit for every pixel to make new bit-plane truncation image (BPTI) to write the information further, allocate the cover image into two regions, region X (use for secret bit) and region Y (use for extra bit), and both regions are used for data write shown in Fig. 3. Hiding capacity increasing on small block size while EC graph is deteriorates on small block size conversely, extra bits are also increasing on small block size that cannot be accommodate into region Y.

In the histogram of image’s “Lena” \(512 \times 512\) pixel size, the peak point corresponds to grayscale values, the highest hiding capacity of image “Lena” which can be used to embed the data but cannot provide large enough free space to hide the information.

The low compression ratio for the intention cannot provide much space for data embedding so that many early schemes were based on lossless compression technique [31, 33]. We have proposed a new technique for reversible data hiding based on efficient compression algorithm, which is slightly better as compared to binary arithmetic coding method with multiple bit planes (CDMBP).

CDMBP divides the size \(A \times A \) into non-overlapping blocks with respect to zero point. A large number of blocks do not have zero point and have nothing to do with that block because we need some space to shift the histogram. First, we have mined the maximum number of zero point ZP with respect to the high probability in each CDMBP block. If ZP exists, then we set the value of the current block \(CB=1;\) otherwise, we set \(CB=0\). We used embedding algorithm where \(CB=1\). Our detailed portrayal is separated into two sections: hiding data phase and recovering and extracting stage in Sects. 3.1 and 3.2. These phases are described in more detail in further subsections.

3.1 Data embedding algorithm

We recode the block that can be used for secret bits to differentiate the location map (LM) to embed the data in embedding and no embedding blocks. The value of LM is 1-bit for each block. If the value of LM is one in this case, we hide the secret data on that block, or else that block will not be used for the data embedding process shown in Fig. 4. Our proposed RDH technique, the sender part, embedded information (I) and proposed conversion (PT) based on efficient compressed domain with multiple bit-plane (CDMBP) image is employed to construct the free hiding space for embedded information I. Afterward, the original image is acquired during converse conversion of \(PT-1\). On the other side, the receiver can employ the same conversion to coalface the embedded data and recover the original image. CDMBP method in hiding phase is used to make a free giant space for information hiding. The grayscale image \(I_{(i,j)}\), \(N \times M\) pixel in size, the image \(I_{(i,j)}\) , and \(N_x(M-1)\) in size of pixel are generated from the original image I. The proposed data hiding phase is described as follows.

In the CDMBP method, cover image I size \(512 \times 512\) is split into two regions X and Y( embedded region and non-embedded region. The region of X, we extracted from 8-bit plane to generate a CDMBP bit-plane image furthermore, CDMBP image divided into non-overlapping blocks with respect of zero point (ZP). If ZP occurs, then we will set the value of the current block \(CB=1;\) or else, we amend to check the ZP yet again. The data will be embedded on blocks when CB is one or else that block skips throughout the embedding process. The whole blocks are skimmed from left to right and top to bottom. The peak point has comparable value with \(G_{(x,y)},\) then PP is modified to hide the secret bit M (generate randomly), and the value of PP will be 0 or 1. We repeat all steps till all blocks have been skimmed; afterward, we generate a stego image \(I^{'}\) in the succeeding embedding algorithm.

Input. Original image I, serect bit S

Output. Stego image \(I^{'}\)

Step 1. The \(512 \times 512\) size cover image alienated into two regions X and Y; the region was employed to embed the extra bits into the last eight columns and rows of pixels. Moreover to compress the extra bits, we used efficient lossless compression algorithm in the subsequent section.

Compression algorithm plays a vital role in data embedding for the reason that they make available additional space for data embedding.

Definition

We employed effectual compression [33] D-biased algorithm, where \(D \epsilon [0, 1/2]\) is D-biased bitstream \(B \epsilon ({0, 1}) ^ {n}\) in case of fraction lower than D or greater than \(1-D\) and D is less than 1 / 2 positive constant.

\(X= (x_ {1}, x_ {2}x_ {n})\) and \(v= (v_ {1}, v_ {2}v_ {n})\) string two n-bit in subsequent order

$$\begin{aligned} x_ {1}.2^{0} + x_ {2}.2x_ {n}. 2^{n-1} < v_ {1}.2^{0} + v_ {2}.2v_ {n}. 2^{n-1} \end{aligned}$$

Bitstream \(B=(B_{1},B_{2},\ldots , B_{n}) \epsilon ({0,1})^{n}\) by means of L ones. Computed e of B ordinal number in ensuing equation.

$$\begin{aligned} \small { e=1+\sum _{m=0}^{n-1}s_{n-m} \left( \begin{matrix} n-m-1\\ L-\sum _{j=0}^{m}{B_n-j+1} \end{matrix} \right) }. \end{aligned}$$
(8)

Input: Bitstream D-biased \( B=(B_{1},B_{2},\ldots , B_{n}) \epsilon ({0,1})^{n},\) while \(f_{i}(B)\) is compressed bitstream attained in succeeding steps:

Step1. Compute ordinal number N of B in the n-bit strings a set with L ones.

Step2. The binary illustration output is (LN), whereas \(\lceil log_ {{2} ^ {n}} \rceil \) has bits of L put in first.

Extraction algorithm for \(f_{i}(B)\)

Input: n and \(f_{i}(B)\) attained original bitstream \(S \epsilon ({0,1})^{n}\) using subsequent steps.

Step 1. The value of (nLN) is calculated from \(f_ {i} (B).\)

Step 2. Recreate B from (nLN).

Step 2. For eight-bit plane, we extracted n-bit plane to generate \(512 \times 512\) size CDMBP image while embedded bits E are generated randomly. According to previous study, many authors used the block division technique [27,28,29,30] to expand the hiding capacity of the image. The hiding proportion rises up by division of image from \(256 \times 256\) to \(2 \times 2;\) consequently, we divided the CDMBP image into non-overlapping blocks.

Step 3. Generate the current block histogram; additionally, find the peak point PP and ZP of the current block. If ZP occurs, then the current block \(CB=1;\) otherwise, we will set \(CB=0\). If the pixel value \(G_{(x,y)}\) of the block is greater than PP, alter the pixel value of block \(G_{a(x,y)}\) to \(G_{a(x,y)}+1;\) else, the value of \(G_{a(x,y)}\) will remain unchanged. The alteration procedure is defined as,

$$\begin{aligned} G_{s(x,y)}= {\left\{ \begin{array}{ll} {G_{d(x,y)}+1},&{} \mathrm{{if}}\quad G_{d(x,y)}>PP\\ G_{d(x,y)}, &{} \mathrm{{otherwise}}. \end{array}\right. } \end{aligned}$$
(9)

Step 4. Look over the entire block from left to right and top to bottom. The peak point has comparable value with \(G_{(x,y)};\) then PP can be amended to hide the secret bit M and the value of PP will be 0 or 1. This process will be continued till the last block to embed the data.

Fig. 5
figure 5

Histogram modification example

For example, the secret bit is 01101, and the whole block is skimmed from top to bottom and left to right. In the embedding block, PP is 24 and ZP is 26. If the values of PP are less than ZP, in this case all 25 values will be increased by one. Embed the secret bit and increase pixel value by one in case the value of PP is 25; if the secret bit is one, no alteration will occur in Fig. 5b, c.

$$\begin{aligned} G_{m(x,y)}= {\left\{ \begin{array}{ll} {G_{m(x,y)}+m},&{} \mathrm{{if}} \quad G_{s(x,y)}=PP\\ G_{s(x,y)}, &{} \mathrm{{otherwise}}. \end{array}\right. } \end{aligned}$$
(10)

Step 5. We use n-bit planes to substitute in cover image to transformed CDMBP, and the extra bits are embedded in region Y. Eventually the stego image \(I^{'}\) is generated. Finally, the stego image has been engendered. To attain the reversibility, the pixel LSBs are mined earlier and fixed to secret bits; likewise, on the other side converse transformation of data embedding algorithm will be executed to regain the secret message.

3.2 Data extraction and cover image retrieval algorithm

In this phase, the secret bits are extracted from stego image correctly, whereas the original media are recovered from stego image entirely without any distortion. Data extraction phase is the opposite operation and is articulated in subsequent steps.

Step 1. The eight-bit planes extract n-bit planes of the respective pixels of stego image embedded in region X, while extra bits extract from non-embedding region Y and are distributed into non-overlapping blocks.

Step 2. The embedded message presume \(m=01101\) extract from \(E_{SI(x,y)}\) for the respective block. First, the whole block is scanned from left to right and top to bottom and its extra bits congruently; also, PP having akin value with \( E_{SI(x,y)}\) is then extracted and the hidden secret bit \(M=0\). If the value of \(PP+1\) is encountered, then secret bit \(M=1\) will be extracted and there is a further shift in the value decrement by 1 and the original pixel value is recovered by inverse transformation.

For example, if the secret bit is 01101 , the whole block is skimmed from top to bottom and left to right. We extract the value from the block where PP is 24 and ZP is 26. If the value of PP is less than that of ZP and CB or LM is one, in this case 0 will be extracted if PP is 24. We extract the secret bit and the recovered pixel value decreased by one in case the value of \(PP+1=25,\) as shown in Fig. 6b, c.

$$\begin{aligned}&E_{SB(x,y)}= {\left\{ \begin{array}{ll} {\mathrm{{extract}}\quad \mathrm{{the}}\quad 0\quad \mathrm{{bit}}},&{} \mathrm{{if}}\quad E_{SI(x,y)}=PP\\ {\mathrm{{extract}}\quad \mathrm{{the}}\quad 1\quad \mathrm{{bit}}},&{} \mathrm{{if}}\quad E_{SI(x,y)}=PP+1, \end{array}\right. } \end{aligned}$$
(11)
$$\begin{aligned}&E_{RI(x,y)}= {\left\{ \begin{array}{ll} E_{SB(x,y)}-1,&{} \mathrm{{if}}\quad E_{SB(x,y)}=PP+1\\ E_{SB(x,y)},&{} \mathrm{{otherwise}}. \end{array}\right. }\nonumber \\ \end{aligned}$$
(12)
Fig. 6
figure 6

Data extraction

figure a

Step 3. Repeat this process to recover till the end of the last blocks.

Step 4. We use n-bit planes to substitute in stego image to reinstate CDMBP, and the extra bits are embedded in region Y. Eventually without any distortion, reinstate the original image I.

4 Experiments

In this slice, we directed several trials to exhibit our proposed method presentation demonstrated by peak-signal-to-noise-ratio (PSNR) and hiding capacity of stego image. We pick six grayscale images in Fig. 2, “Lena”, “Boat”, “Baboon”, “Jet”, “Tiffany” and “Pepper”, all \(512 \times 512\) pixels, serving as cover images and sum of all pixels allied with the PP in the image. Grayscale value adjacent to PP in CDMBP image block has the uppermost number of pixel values; consequently, due to this, we can hide colossal amount of data in the cover image.

4.1 Performance comparisons

We compared our proposed schemes with those of Ni et al. [17], Luo et al. [13], He et al. [32], Kim et al. [11], Lin et al. [25], Liu et al. [27], He et al. [31] methods in term of PSNR and EC. Ni et al.’s EC was restricted due to the number of peak bins, but has high PSNR at 48 dB; this scheme employs one grayscale to reform the utmost pixels and preserve the extra information like the value of PP, ZP and position information of those pixels which have overflow/underflow during the embedding process. In Lin et al. [25], the average PSNR is 35 db, which also decreases if the embedding level (EL) increases because of the high proportion of distortion due to high embedding capacity in marked images. The embedding capacity is also very low, because peak information capacity exceeds the whole embedding capacity for each block.

In Kim et al. [11] image Lena, the PSNR is 35.5 db for EC 0.73, while the maximum PSNR value is 48.9 db; on the other hand, EC is very low. For image Baboon, the PSNR is 44.23 db for EC 0.09, where the block size is \(4 \times 4\). For Luo et al. five test image, the lowest PSNR values are 40.43, 43.68, 49.48 db, for \(EL =2, 1, 0\) while the maximum PSNR is 49.68 db on block division \(2 \times 2\) where \(EL =0\), despite the highest embedding capacity on block division \(3 \times 3\) where \(EL=2,\) the PSNR is less than 40 db. For He et al. [32] image baboon, the PSNR is 44.23 db for EC 0.09, while the maximum EC is 0.25 bpp, but PSNR decreases to 37.36 bpp, where EL is 7.

Liu et al. [27] has high EC and low PSNR; however, there is a need to uphold the more extra information on the small block size.The hiding rate rises by division of image from \(256 \times 256\), \(16 \times 16\), and \(8 \times 8\), \(2 \times 2,\) but PSNR persists downward from the size of \(256 \times 256\) to \(2 \times 2,\) whereas the extra bit increases simultaneously and cannot be accommodated on region Y due to less space. On large block size, the embedded capacity is decreased and the number of extra bits also decreases. In He et al. [31], the Lena image embedding capacity is 0.38 for 43.9 PSNR; however, for image Barbara, the EC is 0.39 for 40.59 PSNR , where multiple embedding level (EL) is 5. In image Lena, the maximum PSNR is 50.62 db, but very low EC which is 0.143 bpp. As the EC is increases near 0.261 bpp, the PSNR gradually drops down near 47.01.

CDMBP scheme has high PSNR and more EC on small block size, as in other methods such as in Ni et al. [17], Luo et al. [13], He et al. [32], Kim et al. [11], Lin et al. [25], Liu et al. [27] and He et al. [31]. Secret bits are randomly generated and embedded on region X of size \(504 \times 504\) represented by EC, while extra bits are embedded in region Y. We have gained high embedding capacity and image quality on \(16 \times 16\) block division with high PSNR of 50.51. Likewise, we controlled the growth proportion of extra bits to expand more EC besides obtaining high PSNR value of 51.03, by using different bit-pane values. We have gained high PSNR and embedding capacity on block division \(2 \times 2\) and sustained the PSNR value that is 49.18.

To check the authenticity of our scheme, we conducted many experiments using multi-embedding. In multi-embedding, stego image can be used as a new cover image for embedding secret data with repetition by using the same embedding algorithm as we recover the cover image reversibly. Multi-embedding is harmless for extracting secret data and similarly will not affect the cover image. Comparing our scheme with previous schemes clearly indicates betterment. After comparing and analyzing the results of the proposed scheme, which is lossless compression algorithm, a slightly better compression ratio as compared to binary arithmetic coding algorithm is revealed and higher hiding capacity with better image quality of stego images is obtained, providing strong evidence for higher capacity, quality and sensitivity.

Table 1 Evaluation of the proposed scheme recital with different size block divisions
Table 2 Evaluation of the proposed scheme with different sizes of bit planes and block division; MBP signifies multiple bit planes, Cap represents embedding capacity and EB depicts extra bits
Table 3 Evaluation of CDMBP with block division \(16 \times 16\) and different bit planes; (Ni et al. [17], Luo et al. [13], Kim et al. [11], Lin et al. [25], Liu et al. [27], He et al. [32])
Fig. 7
figure 7

Visual representations among the stego images and cover images

4.2 Block divisions

According to preceding study, many authors employed the block division technique [27,28,29,30, 32], to progress the hiding capacity; likewise, hiding rate is obtained by division of image from \(256 \times 256\) to \(2 \times 2\). The valuation of the proposed scheme block base division, CDMBP separated into non-overlapping blocks, is shown in Table 1. If a large number of blocks have an extreme number of zero point, then embedding size will be high; in case of the tiniest zero point, then embedded capacity will be low because we cannot enlarge the space to shift the histogram. The CDMBP method has high prospect of zero point with diverse block division to evaluate the EC and PSNR ratio of the image.

Fig. 8
figure 8

Evaluation of our multi-embedding process with regard to EC and PSNR with other techniques

Selection of n bit planes and size can affect the performance of our scheme, as from small blocks we can get more hiding capacities. We assume \(2 \times 2, 3 \times 3, 4\times 4, 6\times 6, 8\times 8, 14\times 14, 18\times 18, \mathrm{{and}} 21\times 21\) blocks in our method. For \(2\times 2\) block, extra bits is five times as compared to the hiding capacity. It is sure that a large number of excessive bits would be difficult to be hidden in region B. Upon increasing the size of block, the hiding capacity will be lower, which will result in extra bits to decrease .

As we know, with small blocks size we can get more hiding capacities. But in \(2\times 2\) block, extra bits are five times as compared to the hiding capacity. It is sure that a large number of excessive bits are difficult to be hidden in region Y; consequently, CDMBP controls the growth proportion of extra bits by expanding more EC besides maintaining high PSNR value.

Efficient compressed domain with multiple bit plane to construct CDMBP image and further split it into non-coinciding blocks with reverence of high probability of zero point (ZP) , shown in Table 2. We seasoned diverse bit planes and block division size from \(256 \times 256\) to \(2 \times 2\). For instance, we reconnoiter higher to lower bit planes with unlike block division to evaluate the EC and PSNR of image. On larger bit planes, embedding capacity is very high but in this case image quality was debauched and extra bit also increased in higher bit planes from two to six, while five to eight bit planes have high image quality but low extra bits and embedding capacity. Three to seven and three to eight have high embedding capacity and image quality. We have gained high embedding capacity and image quality on \(16 \times 16\) and three to seven and three to eight bit planes. Likewise, control of the growth proportion of extra bits to expand more EC besides high PSNR value equate with Ni et a.l’s, Luo et al.’s, Kim et al’s, Lin et al.’s , Liu et al.’s and He et al’s methods as in Table 3.

4.3 Computational complexity

Our proposed scheme’s computational complexity is low, as we do not assume frequency domain like DCT, DWT, etc. It takes a short time for execution for the proposed scheme to perform an operation for generating image histogram for a cover image and hiding messages with no overflow or underflow problem. Beside this, it is also capable of inverse transformation in the spatial domain.

4.4 Lower bound PSNR

Image quality can be measured from PSNR. So in our proposed system, we also considered PSNR for measuring quality of the marked image. After getting the marked image, we investigated lower bound for quality of the marked image.

Our tryout assumption attests that the proposed method effectively performed the objective of high PSNR and EC on small blocks size of image. We have employed six grayscale images \(512 \times 512\) as shown in Fig. 7. All measurements were performed on 1.80 GHz Intel core i-5 CPU with 4GB RAM. Peak signal-to-noise-ratio measured the quality of stego image (visual representation shown in Fig. 8). High PSNR signpost shows that stego image has virtuous visual quality in addition to lowest number of distortions in the stego image.

$$\begin{aligned} PSNR=10x{\text {log}}10\frac{255^2}{\text {MSE}}({\text {db}}) \end{aligned}$$
(13)

5 Conclusions

It is durable to sustain a balance among hiding capacity and image PSNR in the marked image. If EC is high, then PSNR will be low. Large number of blocks that have the tiniest number of zero points at that juncture EC will be low and it is also time consuming to cogitate a block that does not have zero point. Our proposed scheme’s efficiently compressed domain with multiple bit planes (CDMBP) attained more EC in small block size and gained high reversibility. During the embedding process, we mined those blocks that have zero point, and the blocks that do not have zero point were not considered for the embedding process and overwhelmed the problem of extra bits on small block size and overflow/underflow problem. In future, we would try to provide higher embedding capacity with low distortion based on localized bit plane multilayer embedding and try to reduce more extra bits, while increase EC and inflate broadcast quality of image.