Skip to main content
Log in

Toward stronger energy compaction for high capacity dct-based steganography: a region-growing approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

It has been proven that the strong energy compaction property of the Discrete Cosine Transform (DCT) has a relation with the inter-pixel correlation level in the spatial domain of the cover image. Recent studies have proven that the higher the correlation between pixels in the spatial domain, the stronger the energy compaction property of the DCT. Therefore, several state-of-the-art image hiding schemes aim to increase the homogeneity by segmenting the cover image into homogeneous segments to exploit the strong compaction property of the DCT. Early attempts had adopted the idea of segmenting the cover image with fixed-sized blocks to increase the homogeneity. In other attempts, the homogeneity was increased by utilizing the quad-tree segmentation technique, which showed improved results in hiding capacity and stego quality compared to the fixed-block based hiding scheme. This paper proposes the Adaptive Region-Growing (ARG) image hiding scheme, which aims to maximize the inter-pixel correlation level using the region-growing segmentation method. This segmentation technique has the ability to precisely segment the cover image into free-shaped homogeneous regions. Since objects in an image are usually free-shaped regions, it is expected that segmenting into free-shaped regions will maximize the homogeneity level within a region more than block-based segmentation techniques. Therefore, experimental results have shown superior performance of the proposed ARG scheme over competitive steganography techniques in both the hiding capacity and the quality of the stego image that reached up to 40.36 dB at 22.34 bpp.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile Multimedia/Image Processing, Security, and Applications 2014, vol 9120, p 912005

  2. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, Ph.D. Thesis, University of Buckingham

  3. Baziyad M, Rabie T, Kamel I (2018) Extending steganography payload capacity using the l* a* b* color space. In: 2018 International Conference on Innovations in Information Technology (IIT), IEEE, 1–6

  4. Boroumand M, Fridrich J (2018) Deep learning for detecting processing history of images. Electronic Imaging 2018(7):1–9

    Article  Google Scholar 

  5. Datta B, Roy S, Roy S, Bandyopadhyay SK (2019) Multi-bit robust image steganography based on modular arithmetic. Multimedia Tools and Applications 78(2):1511–1546

    Article  Google Scholar 

  6. Dhivya R, Padmapriya V, Sundararaman R, Rayappan JBB, Amirtharajan R (2018) Chaos assisted variable bit steganography in transform domain. Electron Lett 54(23):1332–1334

    Article  Google Scholar 

  7. Gadekallu TR, Khare N, Bhattacharya S, Singh S, Maddikunta PKR, Srivastava G (2020) Deep neural networks to predict diabetic retinopathy, J. Ambient Intell. Humaniz. Comput

  8. Grajeda-Marín IR, Montes-Venegas HA, Marcial-Romero JR, Hernández-Servín JA, Muñoz-Jiménez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32 (01):1860010

    Article  Google Scholar 

  9. Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing 335:299–326

    Article  Google Scholar 

  10. Kalita M, Tuithung T (2016) A novel steganographic method using 8-neighboring pvd (8npvd) and lsb substitution. In: 2016 International Conference on Systems, Signals and Image Processing (IWSSIP), IEEE, 1–5

  11. Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. Journal of information security and applications 40:217–235

    Article  Google Scholar 

  12. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features, ieee transactions on dependable and secure computing

  13. Liao X, Yin J, Guo S, Li X, Sangaiah A K (2018) Medical jpeg image steganography based on preserving inter-block dependencies. Computers & Electrical Engineering 67:320–329

    Article  Google Scholar 

  14. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685–696

    Article  Google Scholar 

  15. Meng R, Rice S G, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster r-cnn. Computers, Materials & Continua 55(1):1–16

    Google Scholar 

  16. Muñoz A (2015) Stegsecret. a simple steganalysis tool, stegsecret. sourceforge. net

  17. Nyeem H (2017) Reversible data hiding with image bit-plane slicing. In: 2017 20th International Conference of Computer and Information Technology (ICCIT), IEEE, 1–6

  18. Rabie T, Baziyad M (2017) Visual fidelity without sacrificing capacity: an adaptive laplacian pyramid approach to information hiding. Journal of Electronic Imaging 26(6):063001

    Article  Google Scholar 

  19. Rabie T, Baziyad M (2019) The pixogram: Addressing high payload demands for video steganography. IEEE Access 7:21948–21962

    Article  Google Scholar 

  20. Rabie T, Baziyad M, Bonny T, Fareh R (2020) Toward a unified performance metric for benchmarking steganography systems. Journal of Circuits, Systems and Computers 29(3):2050042

    Article  Google Scholar 

  21. Rabie T, Kamel I (2016) On the embedding limits of the discrete cosine transform. Multimedia Tools and Applications 75(10):5939–5957

    Article  Google Scholar 

  22. Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools and Applications 76(5):6473–6493

    Article  Google Scholar 

  23. Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimedia Tools and Applications 76(6):8627–8650

    Article  Google Scholar 

  24. Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools and Applications 77(7):8295–8326

    Article  Google Scholar 

  25. Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using lsb technique. IJ Network Security 19(4):593–598

    Google Scholar 

  26. Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (mos) revisited: methods and applications, limitations and alternatives. Multimedia Systems 22(2):213–227

    Article  Google Scholar 

  27. Swain G (2016) A steganographic method combining lsb substitution and pvd in a block. Procedia Computer Science 85:39–44

    Article  Google Scholar 

  28. Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE transactions on circuits and systems for video technology 19(6):906–910

    Article  Google Scholar 

  29. Weber AG (1997) The usc-sipi image database version 5. USC-SIPI Report 315:1

    Google Scholar 

  30. Xiang L, Sun X, Luo G, Xia B (2014) Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications 71 (3):1893–1911

    Article  Google Scholar 

  31. Xiang L, Wang X, Yang C, Liu P (2017) A novel linguistic steganography based on synonym run-length encoding. IEICE transactions on Information and Systems 100(2):313–322

    Article  Google Scholar 

  32. Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on dct and lda topic classification. IEEE Transactions on Multimedia 20 (12):3223–3238

    Article  Google Scholar 

  33. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Baziyad.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Baziyad, M., Rabie, T. & Kamel, I. Toward stronger energy compaction for high capacity dct-based steganography: a region-growing approach. Multimed Tools Appl 80, 8611–8637 (2021). https://doi.org/10.1007/s11042-020-10008-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10008-2

Keywords

Navigation