Skip to main content
Log in

Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

The increasing use of multimedia applications often makes the information prone to leakage and makes the user's privacy at risk. The information hiding technique is mainly used to secure multimedia communication/information by modifying the secret information in a way that makes it useless for an unintended user. In this way, the secret information is secured from unauthorized access. To create a mosaic image, initially, a style transfer is applied using the Convolutional Neural Network (CNN) architecture. The style transfer alters the style of an image using another image still preserving the original content. The CNN’S optimization problem is to optimize the content loss, style loss, and total variation loss done using an Archimedes Optimization Algorithm (AOA). The AOA algorithm also alters the block in the target image by selecting an appropriate tile in the secret image. The tile fitting information is randomly inserted into the selected pixels using an improved dual image-based LSB matching (DILSBM) scheme. The DILSBM scheme can retrieve both the secret and target images from the mosaic image by offering a high PSNR value. The proposed DILSBM and CNN optimized AOA architecture is primarily intended to provide high capacity, improved visual quality, and solve the source image selection problem. The feasibility of the proposed technique can be observed from the experimental analysis where it is analyzed using different performance metrics such as Embedding Rate, Structural Similarity Method (SSIM), and peak signal-to-noise ratio (PSNR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Availability of data and material

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, vol. 1. Springer Science & Business Media, Boston (2001)

    Book  Google Scholar 

  2. Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 77(13), 17333–17373 (2018)

    Article  Google Scholar 

  3. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  4. Gupta, S., Goyal, A., Bhushan, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Mod. Educ. Comput. Sci. 4(6), 27 (2012)

    Article  Google Scholar 

  5. Sahu, A.K., Swain, G.: High fidelity-based reversible data hiding using modified LSB matching and pixel difference. J. King Saud University-Computer Inf. Sci. 31(3), 275–414 (2019)

    Google Scholar 

  6. Sahu, A.K., Swain, G.: A novel n-rightmost bit replacement image steganography technique. 3D Research 10(1), 1–18 (2019)

    Article  Google Scholar 

  7. Gowthul Alam, M.M., Baulkani, S.: Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int. J. Bus. Intell. Data Min. 12(3), 299 (2017)

    Google Scholar 

  8. Sundararaj, V.: An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int. J. Intell. Eng. Syst. 9(3), 117–126 (2016)

    Google Scholar 

  9. Gowthul Alam, M.M., Baulkani, S.: Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput. 23(4), 1079–1098 (2019)

    Article  Google Scholar 

  10. Sundararaj, V.: Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int. J. Biomed. Eng. Technol. 31(4), 325 (2019)

    Article  Google Scholar 

  11. Gowthul Alam, M.M., Baulkani, S.: Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl. Inf. Syst. 60(2), 971–1000 (2019)

    Article  Google Scholar 

  12. Hassan, B.A., Rashid, T.A.: Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Br. 28, 105046 (2020)

    Article  Google Scholar 

  13. Hassan, B.A.: CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput. Appl. 33, 1–20 (2020)

    Google Scholar 

  14. Rejeesh, M.R.: Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed. Tools Appl. 78(16), 22691–22710 (2019)

    Article  Google Scholar 

  15. Sundararaj, V., Muthukumar, S., Kumar, R.S.: An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput. Secur. 77, 277–288 (2018)

    Article  Google Scholar 

  16. Sundararaj, V., Anoop, V., Dixit, P., Arjaria, A., Chourasia, U., Bhambri, P., Rejeesh, M.R., Sundararaj, R.: CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog. Photovolt. Res. Appl. 28(11), 1128–1145 (2020)

    Article  Google Scholar 

  17. Vinu, S.: Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel. Pers. Commun. 104(1), 173–197 (2019)

    Article  Google Scholar 

  18. Lai, I.-J., Tsai, W.-H.: Secret-fragment-visible mosaic image–a new computer art and its application to information hiding. IEEE Trans. Inf. Forensics Secur. 6(3), 936–945 (2011)

    Article  Google Scholar 

  19. Yang, L., Deng, H., Dang, X.: A novel coverless information hiding method based on the most significant bit of the cover image. IEEE Access 8, 108579–108591 (2020)

    Article  Google Scholar 

  20. He, W., Cai, Z.: Reversible data hiding based on dual pairwise prediction-error expansion. IEEE Trans. Image Process. 30, 5045–5055 (2021). https://doi.org/10.1109/TIP.2021.3078088

    Article  Google Scholar 

  21. Sheidani, S., Mahmoudi-Aznaveh, A., Eslami, Z.: CPA-Secure privacy-preserving reversible data hiding for JPEG images. IEEE Trans. Inf. Forensics Secur. (2021). https://doi.org/10.1109/TIFS.2021.3080497

    Article  Google Scholar 

  22. Zhou, Z., Cao, Y., Wang, M., Fan, E., Wu, Q.M.J.: Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access 7, 179891–179897 (2019)

    Article  Google Scholar 

  23. Li, S., Liang, Hu., Sun, C., Chi, L., Li, T., Li, H.: A reversible data hiding algorithm based on prediction error with large amounts of data hiding in spatial domain. IEEE Access 8, 214732–214741 (2020)

    Article  Google Scholar 

  24. Li, L., Zhang, W., Qin, C., Chen, K., Zhou, W., Yu, N.: Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181, 107920 (2021)

    Article  Google Scholar 

  25. Yao, H., Qin, C., Tang, Z., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152–163 (2017)

    Article  Google Scholar 

  26. Yin, J., Bo, Ou., Liu, X., Peng, F.: Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. Digit. Signal Process. 81, 173–185 (2018)

    Article  Google Scholar 

  27. Chen, Y.-C., Hung, T.-H., Hsieh, S.-H., Shiu, C.-W.: A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 14(12), 3332–3343 (2019)

    Article  Google Scholar 

  28. Hou, J., Ou, B., Tian, H., Qin, Z.: Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Process.: Image Commun. 92, 116118 (2021)

    Google Scholar 

  29. Zang, H., Liu, L., Sun, Li., Cheng, L., Wei, Z., Sun, G.: Short-term global horizontal irradiance forecasting based on a hybrid CNN-LSTM model with spatiotemporal correlations. Renew. Energy 160, 26–41 (2020)

    Article  Google Scholar 

  30. Albawi, S, Mohammed, TA, Al-Zawi, S.: Understanding of a convolutional neural network. In: 2017 International Conference on Engineering and Technology (ICET), pp. 1–6. IEEE, (2017).

  31. Gatys, LA, Ecker, AS, Bethge, M.:A neural algorithm of artistic style. arXiv preprintarXiv:1508.06576 (2015)

  32. Gatys, LA, Ecker, AS, Bethge, M:. Image style transfer using convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2414–2423. (2016)

  33. Omiotek, Z., Kotyra, A.: Flame image processing and classification using a pre-trained VGG16 model in combustion diagnosis. Sensors 21(2), 500 (2021)

    Article  Google Scholar 

  34. Ahuja, S., Panigrahi, B.K., Dey, N., Rajinikanth, V., Gandhi, T.K.: Deep transfer learning-based automated detection of COVID-19 from lung CT scan slices. Appl. Intell. 51(1), 571–585 (2021)

    Article  Google Scholar 

  35. Hashim, F.A., Hussain, K., Houssein, E.H., Mabrouk, M.S., Al-Atabany, W.: Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl. Intell. 51(3), 1531–1551 (2021)

    Article  MATH  Google Scholar 

  36. Ali, Z.M., Diaaeldin, I.M., El-Rafei, A., Hasanien, H.M., Aleem, S.H.E.A., Abdelaziz, A.Y.: A novel distributed generation planning algorithm via graphically-based network reconfiguration and soft open points placement using Archimedes optimization algorithm. Ain Shams Eng. J. 12(2), 1923–1941 (2021)

    Article  Google Scholar 

  37. Green, R.C., Wang, L., Alam, M.: Training neural networks using central force optimization and particle swarm optimization: insights and comparisons. Exp. Syst. Appl. 39(1), 555–563 (2012)

    Article  Google Scholar 

  38. Pradhan, M., Roy, P.K., Pal, T.: Grey wolf optimization applied to economic load dispatch problems. Int. J. Electr. Power Energy Syst. 83, 325–334 (2016)

    Article  Google Scholar 

  39. Wang, Y.-L., Shen, J.-J., Hwang, M.-S.: An improved dual image-based reversible hiding technique using LSB matching. IJ Netw. Secur. 19(5), 858–862 (2017)

    Google Scholar 

  40. Lu, T.-C., Yang, P.-C., Jana, B.: Improving the reversible LSB matching scheme based on the likelihood re-encoding strategy. Entropy 23(5), 577 (2021)

    Article  MathSciNet  Google Scholar 

  41. Mishra, A., Agarwal, C., Sharma, A., Bedi, P.: Optimized gray-scale image watermarking using DWT–SVD and firefly algorithm. Expert Syst. Appl. 41(17), 7858–7867 (2014)

    Article  Google Scholar 

  42. Deshmukh, A.B., Dudul, S.V.: Design and analysis of denoising framework for overcoming speckle noise footprints. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(6), 4478–4488 (2021)

    Google Scholar 

  43. Arulpandy, P., Pricilla, M.T.: Speckle noise reduction and image segmentation based on a modified mean filter. Comput. Assist. Methods Eng. Sci. 27(4), 221–239 (2020)

    Google Scholar 

Download references

Funding

None.

Author information

Authors and Affiliations

Authors

Contributions

JPS agreed on the content of the study. JPS and KM collected all the data for analysis. JPS agreed on the methodology. JPS and KM completed the analysis based on the agreed steps. Results and conclusions are discussed and written together. The author read and approved the final manuscript.

Corresponding author

Correspondence to S. Jaya Prakash.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the.

authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jaya Prakash, S., Mahalakshmi, K. Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer. Vis Comput 38, 4129–4150 (2022). https://doi.org/10.1007/s00371-021-02285-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-021-02285-1

Keywords

Navigation