Skip to main content
Log in

Large-capacity image data hiding based on table look-up

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Data hiding, also known as information hiding and digital watermarking, refers to the technology of hiding secret information in publicly available media and making it difficult for people to feel its existence. According to the survival result of the hidden information when the stego media is processed, this technology can be divided into robust, semi-fragile, and fragile watermarking. Strong robust digital watermarking is technically difficult to achieve, so it is unrealistic to apply it for digital copyright protection at present. In contrast, fragile (and semi-fragile) watermarking has good feasibility and has been used for authentication and tamper localization of the stego media. However, the existing technology has limitations. To improve the sensitivity and positioning accuracy of tampering, some algorithms embed excessive data, which greatly reduces the fidelity of stego media. To prevent third parties from bypassing integrity authentication and tamper localization, some algorithms add complex encryption algorithms to achieve the confidentiality of hidden data, which not only greatly increases the computational cost, but also destroys the blindness of data extraction. To overcome these shortcomings, this paper proposes a lightweight large-capacity image data-hiding technology. Both the data hiding and data extraction are based on looking up a shared codebook table, so the computational cost on both sides is low. The codebook table can be flexibly customized according to the agreement of the sender and receiver of the stego image. It not only ensures the fidelity of stego image but also naturally provides the confidentiality of hidden data. The experimental results and analysis show that its comprehensive performance, including imperceptibility, capacity, complexity, security, and customizability, is better than various state-of-the-art fragile watermarking techniques. Thus, the proposed technique has obvious advantages when used in image authentication, tampering localization, source tracing, and steganography. The proposed technique can be flexibly extended to hide data in other media.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Abdel Raouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80:23393–23417. https://doi.org/10.1007/s11042-020-10224-w

    Article  Google Scholar 

  2. Akgul A, Kacar S, Aricioglu B (2017) A new two-level data hiding algorithm for high security based on a nonlinear system. Nonlinear Dynam 90:1123–1140. https://doi.org/10.1007/s11071-017-3714-8

    Article  MathSciNet  Google Scholar 

  3. Akhtarkavan E, Majidi B, Mandegari A (2023) Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and Lattice Vector Quantization. IEEE Access 11:9701–9715. https://doi.org/10.1109/ACCESS.2023.3238575

    Article  Google Scholar 

  4. Alshehri L, Hussain M, Aboalsamh H, at al. (2020) Fragile watermarking for image authentication using BRINT and ELM. Multimed Tools Appl 79:29199–29223. https://doi.org/10.1007/s11042-020-09441-0

    Article  Google Scholar 

  5. Anand A, Singh AK (2022) SDH: Secure Data Hiding in Fused Medical Image for Smart Healthcare. IEEE Trans Comput Soc Syst 9(4):1265–1273. https://doi.org/10.1109/TCSS.2021.3125025

    Article  Google Scholar 

  6. Asad NM, Salameh HI (2012) A Modification of Odd and Even Digital Watermark Technique. Asian J Inform Technol 11(4):151–152

    Article  Google Scholar 

  7. Basu S, Debnath A, Basu A et al (2022) An image data hiding technique using Differential Evolution. Multimed Tools Appl 81:39995–40012. https://doi.org/10.1007/s11042-022-12557-0

    Article  Google Scholar 

  8. Bose A, Maity SP (2022) Secure sparse watermarking on DWT-SVD for digital images. J Inform Sec Appl 68. https://doi.org/10.1016/j.jisa.2022.103255

  9. Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(1):469–474

    Article  MATH  Google Scholar 

  10. Chang J-C, Lu Y-Z, Wu H-L (2017) A separable reversible data hiding scheme for encrypted JPEG bit streams. Signal Process 133:135–143

    Article  Google Scholar 

  11. Chen Y-Y, Chi K-Y (2019) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimedia Systems 25:551–563. https://doi.org/10.1007/s00530-017-0560-y

    Article  Google Scholar 

  12. Chen Y-Y, Hsia C-H, Jhong S-Y et al (2018) Data hiding method for AMBTC compressed images, Journal of Ambient Intelligence and Humanized. Comput. https://doi.org/10.1007/s12652-018-1048-0

  13. Chen B, Yin X, Lu W et al (2023) Reversible data hiding in encrypted domain by signal reconstruction. Multimed Tools Appl 82:1203–1222. https://doi.org/10.1007/s11042-022-13266-4

    Article  Google Scholar 

  14. Dragoi IC, Coltuc D (2021) On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans Inform Foren Sec 16:187–189. https://doi.org/10.1109/TIFS.2020.3006382

    Article  Google Scholar 

  15. Huang H-S (2015) A combined image steganographic method using multi-way pixel value differencing, the Sixth International Conference on Graphic and Image Pro­cessing, ICGIP 2015. Int Soc Optics Phot 2015:315–319

    Google Scholar 

  16. Jhong C-L, Wu H-L (2022) Grayscale-Invariant Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans Circuits Syst Video Technol 32(9):5888–5901. https://doi.org/10.1109/TCSVT.2022.3164013

    Article  Google Scholar 

  17. Jung K-H (2010) High-capacity steganographic method based on pixel-value differencing and LSB replacement methods. Imaging Sci J 58(2010):213–221

    Article  Google Scholar 

  18. Jung K-H, Yoo K-Y (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl 74(2015):2143–2155

    Article  Google Scholar 

  19. Kamili A, Hurrah NN, Parah SA et al (2021) DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and Tamper Localization. IEEE Trans Industr Inform 17(7):5108–5117. https://doi.org/10.1109/TII.2020.3028612

    Article  Google Scholar 

  20. Khadse DB, Swain G (2022) Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree. Arab J Sci Eng. https://doi.org/10.1007/s13369-022-06961-9

  21. Khan LS, Khan M, Hazzazi MM et al (2023) A novel combination of information confidentiality and data hiding mechanism. Multimed Tools Appl 82:6917–6941. https://doi.org/10.1007/s11042-022-13623-3

    Article  Google Scholar 

  22. Khodaei M, Faez K (2012) New adaptive steganographic method using least significant bit substitution and pixel-value differencing. IET Image Process 6(2012):677–686

    Article  Google Scholar 

  23. Kim HW, Choi D, Kim T (2010) Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Process 90(8):2605–2610

    Article  MATH  Google Scholar 

  24. Kim D-S, Yoon E-J, Kim C et al (2018) Reversible data hiding scheme with edge-direction predictor and modulo operation. J Real-Time Image Proc 14:137–145. https://doi.org/10.1007/s11554-015-0548-9

    Article  Google Scholar 

  25. Kumar S, Gupta A, Walia GS (2022) Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges. Appl Intell 52:7373–7406. https://doi.org/10.1007/s10489-021-02789-2

    Article  Google Scholar 

  26. Leelavathi R, Prasad MNG (2022) A high capacity reversible data hiding scheme in efficient LZW compression. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-13765-4

  27. Lefèvre P, Carré P, Fontaine C et al (2022) Efficient image tampering localization using semi-fragile watermarking and error control codes. Signal Process 190. https://doi.org/10.1016/j.sigpro.2021.108342

  28. Li F, Mao Q, Chang C-C (2018) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77:5149–5168. https://doi.org/10.1007/s11042-017-4388-4

    Article  Google Scholar 

  29. Li Y, Chang C-C, He M (2020) High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique. IEEE Access 8:32226–32245. https://doi.org/10.1109/ACCESS.2020.2973179

    Article  Google Scholar 

  30. Lin Y-K (2014) A data hiding scheme based upon DCT coefficient modification. Comput Stand Inter 36(5):855–862

    Article  Google Scholar 

  31. Liu J-L, Lou D-C, Tso H-K (2006) A robust watermarking scheme using self-reference image. Comput Stand Interf 28(3):356–367

    Article  Google Scholar 

  32. Liu Z, Huang Y, Huang J (2019) Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. IEEE Trans Inform Forensics Sec 14(5):1171–1180

    Article  Google Scholar 

  33. Luo Y, Li L, Liu J, at al.. (2021) A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst Appl 168. https://doi.org/10.1016/j.eswa.2020.114272

  34. Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77(2018):15803–15827

    Article  Google Scholar 

  35. Mandal J, Das D (2017) Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow. Signal Process 122(2017):234–244

    Google Scholar 

  36. Moad MS, Kafi MR, Khaldi A (2022) A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess Microsyst 90. https://doi.org/10.1016/j.micpro.2022.104490

  37. Mohammad AA, Ali A-H, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl 78:7181–7205. https://doi.org/10.1007/s11042-018-6465-8

    Article  Google Scholar 

  38. Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multim 6(1):1–15

    Article  Google Scholar 

  39. Patel R, Lad K, Patel M et al (2021) A hybrid DST-SBPNRM approach for compressed video steganography. Multimedia Systems 27:417–428. https://doi.org/10.1007/s00530-020-00735-9

    Article  Google Scholar 

  40. Prasad S, Pal AK (2020) Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79:20897–20928. https://doi.org/10.1007/s11042-020-08715-x

    Article  Google Scholar 

  41. Raj NR, Shreelekshmi R (2022) Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition. J Visual Commun Imag Represent 85. https://doi.org/10.1016/j.jvcir.2022.103500

  42. Roselin Kiruba R, Sharmila TS (2023) A novel data hiding by image interpolation using edge quad-tree block complexity. Vis Comput 39:59–72. https://doi.org/10.1007/s00371-021-02312-1

    Article  Google Scholar 

  43. Singla D, Syal R (2012) Data Security Using LSB & DCT Steganography In Images. Int J Comput Engin Res 2(2):359–364

    Google Scholar 

  44. Sisaudia V, Vishwakarma VP (2022) A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling. J Inform Sec Appli 69. https://doi.org/10.1016/j.jisa.2022.103296

  45. Tsai C-S, Zhang Y-S, Weng C-Y (2022) Separable reversible data hiding in encrypted images based on Paillier cryptosystem. Multimed Tools Appl 81:18807–18827. https://doi.org/10.1007/s11042-022-12684-8

    Article  Google Scholar 

  46. Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25(15):1681–1689

    Article  Google Scholar 

  47. Wang Z-H, Chang C-C, Li M-C (2012) Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf Sci 192(2012):98–108

    Article  Google Scholar 

  48. Wang J, Zhang L-Y, Chen J et al (2019) Compressed Sensing Based Selective Encryption With Data Hiding Capability. IEEE Trans Indust Inform 15(12):6560–6571. https://doi.org/10.1109/TII.2019.2924083

    Article  Google Scholar 

  49. Xia Z, Zhang W, Duan H et al (2022) Fragile watermarking scheme in spatial domain based on prime number distribution theory. Multimed Tools Appl 81:6477–6496. https://doi.org/10.1007/s11042-021-11704-3

    Article  Google Scholar 

  50. Yadav GS, Mangal P, Parmar G et al (2023) Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-14322-9

  51. Yang H, Sun X, Sun G (2019) A high-capacity image data hiding scheme using adaptive LSB substitution. Radio Eng 18(2009):509–516

    Google Scholar 

  52. Yi S, Zhou Y (2019) Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. IEEE Trans Multimed 21(1):51–64. https://doi.org/10.1109/TMM.2018.2844679

    Article  Google Scholar 

  53. Yin Z, Xiang Y, Zhang X (2020) Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Trans Multimed 22(4):874–884. https://doi.org/10.1109/TMM.2019.2936314

    Article  Google Scholar 

  54. Yu M, Yao H, Qin C et al (2023) Reversible Data Hiding in Palette Images. IEEE Trans Circuits Syst Video Technol 33(2):648–660. https://doi.org/10.1109/TCSVT.2022.3207270

    Article  Google Scholar 

  55. Zaid AO, Makhloufi A, Bouallegue A (2009) Improved QIM-based watermarking integrated to JPEG2000 coding scheme. Sign, Image Video Proc 3(2009):197–207

    Article  MATH  Google Scholar 

  56. Zhang H, Sun S, Hu L et al (2022) A novel data hiding scheme based on improved diamond encoding in IWT domain. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-14235-7

Download references

Acknowledgment

The authors are grateful to anonymous reviewers for useful suggestions. This research was sponsored by the Key R&D Program of Hubei Province, China (Grant number 2021BAA039). Thank Prof. Xiaochuan Shi, who works at the School of Cyber Science and Engineering of Wuhan University, for helping to obtain the funding.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Huyin Zhang or Yulin Wang.

Ethics declarations

Conflict of interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, and there is no professional or other personal interest of any nature or kind in any product, service, and/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, W., Zhang, H., Reulke, R. et al. Large-capacity image data hiding based on table look-up. Multimed Tools Appl 82, 44123–44146 (2023). https://doi.org/10.1007/s11042-023-15514-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15514-7

Keywords

Navigation