Abstract
It has been proven that the strong energy compaction property of the Discrete Cosine Transform (DCT) has a relation with the inter-pixel correlation level in the spatial domain of the cover image. Recent studies have proven that the higher the correlation between pixels in the spatial domain, the stronger the energy compaction property of the DCT. Therefore, several state-of-the-art image hiding schemes aim to increase the homogeneity by segmenting the cover image into homogeneous segments to exploit the strong compaction property of the DCT. Early attempts had adopted the idea of segmenting the cover image with fixed-sized blocks to increase the homogeneity. In other attempts, the homogeneity was increased by utilizing the quad-tree segmentation technique, which showed improved results in hiding capacity and stego quality compared to the fixed-block based hiding scheme. This paper proposes the Adaptive Region-Growing (ARG) image hiding scheme, which aims to maximize the inter-pixel correlation level using the region-growing segmentation method. This segmentation technique has the ability to precisely segment the cover image into free-shaped homogeneous regions. Since objects in an image are usually free-shaped regions, it is expected that segmenting into free-shaped regions will maximize the homogeneity level within a region more than block-based segmentation techniques. Therefore, experimental results have shown superior performance of the proposed ARG scheme over competitive steganography techniques in both the hiding capacity and the quality of the stego image that reached up to 40.36 dB at 22.34 bpp.
Similar content being viewed by others
References
Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile Multimedia/Image Processing, Security, and Applications 2014, vol 9120, p 912005
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, Ph.D. Thesis, University of Buckingham
Baziyad M, Rabie T, Kamel I (2018) Extending steganography payload capacity using the l* a* b* color space. In: 2018 International Conference on Innovations in Information Technology (IIT), IEEE, 1–6
Boroumand M, Fridrich J (2018) Deep learning for detecting processing history of images. Electronic Imaging 2018(7):1–9
Datta B, Roy S, Roy S, Bandyopadhyay SK (2019) Multi-bit robust image steganography based on modular arithmetic. Multimedia Tools and Applications 78(2):1511–1546
Dhivya R, Padmapriya V, Sundararaman R, Rayappan JBB, Amirtharajan R (2018) Chaos assisted variable bit steganography in transform domain. Electron Lett 54(23):1332–1334
Gadekallu TR, Khare N, Bhattacharya S, Singh S, Maddikunta PKR, Srivastava G (2020) Deep neural networks to predict diabetic retinopathy, J. Ambient Intell. Humaniz. Comput
Grajeda-Marín IR, Montes-Venegas HA, Marcial-Romero JR, Hernández-Servín JA, Muñoz-Jiménez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32 (01):1860010
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
Kalita M, Tuithung T (2016) A novel steganographic method using 8-neighboring pvd (8npvd) and lsb substitution. In: 2016 International Conference on Systems, Signals and Image Processing (IWSSIP), IEEE, 1–5
Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. Journal of information security and applications 40:217–235
Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features, ieee transactions on dependable and secure computing
Liao X, Yin J, Guo S, Li X, Sangaiah A K (2018) Medical jpeg image steganography based on preserving inter-block dependencies. Computers & Electrical Engineering 67:320–329
Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685–696
Meng R, Rice S G, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster r-cnn. Computers, Materials & Continua 55(1):1–16
Muñoz A (2015) Stegsecret. a simple steganalysis tool, stegsecret. sourceforge. net
Nyeem H (2017) Reversible data hiding with image bit-plane slicing. In: 2017 20th International Conference of Computer and Information Technology (ICCIT), IEEE, 1–6
Rabie T, Baziyad M (2017) Visual fidelity without sacrificing capacity: an adaptive laplacian pyramid approach to information hiding. Journal of Electronic Imaging 26(6):063001
Rabie T, Baziyad M (2019) The pixogram: Addressing high payload demands for video steganography. IEEE Access 7:21948–21962
Rabie T, Baziyad M, Bonny T, Fareh R (2020) Toward a unified performance metric for benchmarking steganography systems. Journal of Circuits, Systems and Computers 29(3):2050042
Rabie T, Kamel I (2016) On the embedding limits of the discrete cosine transform. Multimedia Tools and Applications 75(10):5939–5957
Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools and Applications 76(5):6473–6493
Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimedia Tools and Applications 76(6):8627–8650
Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools and Applications 77(7):8295–8326
Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using lsb technique. IJ Network Security 19(4):593–598
Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (mos) revisited: methods and applications, limitations and alternatives. Multimedia Systems 22(2):213–227
Swain G (2016) A steganographic method combining lsb substitution and pvd in a block. Procedia Computer Science 85:39–44
Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE transactions on circuits and systems for video technology 19(6):906–910
Weber AG (1997) The usc-sipi image database version 5. USC-SIPI Report 315:1
Xiang L, Sun X, Luo G, Xia B (2014) Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications 71 (3):1893–1911
Xiang L, Wang X, Yang C, Liu P (2017) A novel linguistic steganography based on synonym run-length encoding. IEICE transactions on Information and Systems 100(2):313–322
Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on dct and lda topic classification. IEEE Transactions on Multimedia 20 (12):3223–3238
Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Baziyad, M., Rabie, T. & Kamel, I. Toward stronger energy compaction for high capacity dct-based steganography: a region-growing approach. Multimed Tools Appl 80, 8611–8637 (2021). https://doi.org/10.1007/s11042-020-10008-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10008-2