Skip to main content
Log in

A new data hiding model based on adaptive keyed Huffman multi-layer midpoint folding and optimized deep wavelet histogram modification strategy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With recent advanced science and technology, it is much easier to transmit, search and find information on the Internet platform. However, sharing secret data on the Internet is challenging because of the increased number of unauthorized users. Thus, the proposed work introduces a new data-hiding model to enhance the payload capacity with higher security. Initially, the secret image is transformed into binary form, and then four consecutive binary bits are considered to obtain a sequence of decimal values. This work proposes a new adaptive keyed Huffman multi-layer midpoint folding strategy (aKH-MMF) method to minimize the embedded data size. This method uses the Huffman encoding scheme to encode the secret data with a secret key. Additionally, a multi-layer midpoint folding approach is introduced to minimize distortion during the embedding process. The proposed aKH-MMF method finds out an index for each encoded bit. These encoded bits are embedded in the cover image using an Equilibrium-optimized 2D mapping scheme. This scheme utilizes a DeepWave-Hist model (deep wavelet neural network) to generate multiple histograms for the cover images. After the generation of histograms, an optimal mapping scheme is selected for all histograms using the Equilibrium optimization (EO) approach. Finally, the encoded index is embedded into the cover image with the help of a Least Significant Method (LSB). The experimental setup is done using MATLAB software, and the proposed data-hiding model is processed through the MISC dataset. The simulation results show that the proposed model obtains better results in improved payload capacity as 2262.1155 bpp for the images like Lena, Tiffany and Airplane. Also, the attained PSNR of Lena is 57.27 dB, Tiffany is 58 dB, and Airplane is 56.48 dB. Compared with other existing data-hiding models, the results achieved for the proposed study are highly superior.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article.

References

  1. AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multim Tools Appl 80(15):23393–23417

    Article  Google Scholar 

  2. Akhtarkavan E, Majidi B, Salleh MFM, Patra JC (2020) Fragile high capacity data hiding in digital images using integer-to-integer DWT and lattice vector quantization. Multimed Tools Appl 79(19):13427–13447

    Article  Google Scholar 

  3. Ambadekar SP, Jain J and Khanapuri J (2019) Digital image watermarking through encryption and DWT for copyright protection. In Recent Trends in Signal and Image Processing: ISSIP 2017, Springer Singapore 187–195

  4. Chen C-C, Chang C-C, Chen K (2021) High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels. J Vis Commun Image Represent 76:103060

    Article  Google Scholar 

  5. Chen Y-q, Sun W-j, Li L-y, Chang C-C, Wang X (2020) An efficient general data hiding scheme based on image interpolation. J Inf Security Appl 54:102584

    Google Scholar 

  6. Garg P, Kishore RR (2020) An improved and secured digital image watermarking technique using DCT, fuzzy entropy and image scrambling in hybrid domain. J Discrete Math Sci Crypt 23(1):177–186

    Google Scholar 

  7. He B, Chen Y, Zhou Y, Wang Y, Chen Y (2022) A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images. Int J Distrib Sens Netw 18(3):15501329221084226

    Article  Google Scholar 

  8. Hou J, Ou B, Tian H, Qin Z (2021) Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Process: Image Commun 92:116118

    Google Scholar 

  9. Kadhim IJ et al (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326

    Article  Google Scholar 

  10. Ke Y, Zhang M-Q, Liu J, Su T-T, Yang X-Y (2020) Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans Circuits Syst Video Technol 30(8):2353–2365

    Article  Google Scholar 

  11. Khan AA, Shaikh AA, Cheikhrouhou O, Laghari AA, Rashid M, Shafiq M, Hamam H (2022) IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network. IET Image Proc 16(11):2854–2862

    Article  Google Scholar 

  12. Laishram D, Tuithung T (2021) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity. Multim Tools Appl 80(1):831–854

    Article  Google Scholar 

  13. Li N, Huang F (2020) Reversible data hiding for JPEG images based on pairwise non-zero AC coefficient expansion. Signal Process 171:107476

    Article  Google Scholar 

  14. Lu J, Zhou G, Yang C, Li Z, Lan M (2019) Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection. IEEE Access 7:21702–21711

    Article  Google Scholar 

  15. Ma B, Wang X, Li Q, Li B, Li J, Wang C, Shi Y (2019) Adaptive error prediction method based on multiple linear regression for reversible data hiding. J Real-Time Image Process 16(4):821–834

    Article  Google Scholar 

  16. Ma S, Li X, Xiao M, Ma B, Zhao Y (2022) Fast expansion-bins-determination for multiple histograms modification based reversible data hiding. IEEE Signal Process Lett 29:662–666

    Article  Google Scholar 

  17. Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim Syst Signal Process 29(4):1801–1818

    Article  MATH  Google Scholar 

  18. Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ-Comput Inf Sci 31(3):335–347

    Google Scholar 

  19. Meenpal A, Majumder S (2022) Image content based secure reversible data hiding scheme using block scrambling and integer wavelet transform. Sādhanā 47(2):54

    Article  MathSciNet  Google Scholar 

  20. Meikap S, Jana B (2021) Improved center-folding based directional pixel value ordering for reversible data hiding scheme. Multim Tools Appl 80(4):5617–5652

    Article  Google Scholar 

  21. Nashat D, Mamdouh L (2019) An efficient steganographic technique for hiding data. J Egypt Math Soc 27(1):1–14

    Article  MathSciNet  MATH  Google Scholar 

  22. Qu Z, Cheng Z, Liu W, Wang X (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimed Tools Appl 78:7981–8001

    Article  Google Scholar 

  23. Sahila KM and Thomas B (2021) Secure digital image watermarking by using SVD and AES. In Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2020, Springer Singapore, 805–818

  24. Shafiq M, Tian Z, Bashir AK, Cengiz K, Tahir A (2020) SoftSystem: smart edge computing device selection method for IoT based on soft set technique. Wirel Commun Mob Comput 2020:1–10

    Article  Google Scholar 

  25. Shaji C, Sam IS (2021) New Center Folding Strategy Encoding for Reversible Data Hiding in Dual Stego Images. Intelligent Systems. Springer, Singapore, pp 83–89

    Chapter  Google Scholar 

  26. Shastri S, Thanikaiselvan V (2019) Dual image reversible data hiding using trinary assignment and centre folding strategy with low distortion. J Vis Commun Image Represent 61:130–140

    Article  Google Scholar 

  27. Sehra K, Raut S, Mishra A, Kasturi P, Wadhera S, Saxena GJ, Saxena M (2021) Robust and secure digital image watermarking technique using Arnold transform and memristive chaotic oscillators. IEEE Access 9:72465–72483

    Article  Google Scholar 

  28. Wang X, Chang C-C, Lin C-C (2021) Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Inf Sci 567:375–394

    Article  MathSciNet  Google Scholar 

  29. Wang X, Wang X, Ma B, Li Q, Shi Y-Q (2021) High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett 28:1125–1129

    Article  Google Scholar 

  30. Zhao J, Li Z (2018) Three-dimensional histogram shifting for reversible data hiding. Multimed Syst 24(1):95–109

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Kamaldeep Joshi.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any authors.

Consent to participate

All authors have agreed to participate in this submitted article.

Consent to publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Conflict of interest

Authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Allwadhi, S., Joshi, K., Yadav, A.K. et al. A new data hiding model based on adaptive keyed Huffman multi-layer midpoint folding and optimized deep wavelet histogram modification strategy. Multimed Tools Appl 82, 47189–47214 (2023). https://doi.org/10.1007/s11042-023-15390-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15390-1

Keywords

Navigation