Skip to main content
Log in

A novel adaptive data hiding based on improved EMD and interpolation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Hiding data on grayscale images has been drawing much attention in recent years. High capacity and better image quality are the two foremost research contents of data hiding. The traditional EMD which concealed an equal amount of data into each pixel and cause equal degree of distortion. Meanwhile due to being only an approximation, an interpolated image will always lose some quality each time interpolation is performed. In view of the problems existing in the two above method, we propose a novel data hiding scheme that employs human vision sensitivity to hide a large amount of secret bits into a original image with a high imperceptibility and low computational complexity. Experimental results reveal that the proposed method performs better than several state-of-the-art methods. It can resist the RS steganalysis attack and it is statistically invisible for the attack of PVD histogram attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abu-Aarie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process (IJSIP) 1(1):196–204

    Google Scholar 

  2. Allebach J, Wong PW (1996) Edge-directed interpolation. IEEE Int Conf Image Process 3:707–710

    Article  Google Scholar 

  3. Al-Otaibi N A, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory. Eng Tech Publ 2 (2):151–157

    Google Scholar 

  4. Byung J, Jung K, Yoo K (2008) Improved data hiding method by exploiting modification direction. In: International symposium on ubiquitous multimedia computing, UMC’08, pp 264–266

  5. Chang C, Lee C, Chuang L (2007) Using dynamic programming strategy to find an optimal solution to exploiting modification direction embedding method. In: Proceedings of the third international conference on intelligent information hiding and multi-media signal processing. Kaohsiung, pp 489–492

  6. Chang C, Tai W, Chen K (2007) Improvements of EMD embedding for large payloads. In: Proceedings of the third international conference on intelligent information hiding and multimedia signal processing (IIHMSP07). Kaohsiung, pp 473–476

  7. Chao R, Wu H, Lee C, Chu Y (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur. doi:10.1155/2009/658047

  8. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM workshop on multimedia and security, pp 27–30

  9. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel Indicator high capacity technique for RGB image based steganography. In: WoSPA 2008—5th IEEE international workshop on signal processing and its applications. University of Sharjah, U.A.E.

  10. Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. In: AICCSA-2009—the 7th ACS/IEEE international conference on computer systems and applications, pp 400–403

  11. Hong W, Chen T (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131–140

    Article  Google Scholar 

  12. Hong W, Chen T, Yin Z, Luo B, Ma Y (2017) Data hiding in AMBTC images using quantization level modification and perturbation technique. Multimed Tools Appl 76:3761–3782

    Article  Google Scholar 

  13. Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447–455

    Article  Google Scholar 

  14. Jung K, Yoo K (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31:465–470

    Article  Google Scholar 

  15. Jung K, Yoo K (2009) Improved exploiting modification direction method by modulus operation. Int J Signal Process Image Process Pattern 2(1):79–88

    Google Scholar 

  16. Jung K, Yoo K (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl 74(6):2143–2155

    Article  Google Scholar 

  17. Khan F, Gutub AA-A (2007) Message concealment techniques using image based steganography. In: The 4th IEEE GCC conference and exhibition. Gulf International Convention Centre, Manamah, pp 11–14

  18. Kieu T, Chang C (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38(8):10648–10657

    Article  Google Scholar 

  19. Lee C, Chang C, Wang K (2008) An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis Comput 26(12):1670–1676

    Article  Google Scholar 

  20. Lee C, Huang Y (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39:6712–6719

    Article  Google Scholar 

  21. Lee C, Wang Y, Chang C (2007) A steganographic method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the third international conference on intelligent information hiding and multimedia signal processing (IIHMSP07). Kaohsiung, pp 497–500

  22. Lee C, Weng C, Chen K (2017) An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimed Tools Appl. doi:10.1007/s11042-016-3591-z

  23. Lehmann MT, Gonner C, Spitzer K (1999) Survey: interpolation methods in medical image processing. IEEE Trans Med Imaging 18(11):1049–1075

    Article  Google Scholar 

  24. Lu T, Chang C, Huang Y (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed Tools Appl 72:417–435

    Article  Google Scholar 

  25. Malik A, Sikka G, Verma H (2017) Image interpolation based high capacity reversible data hiding scheme. Multimed Tools Appl. doi:10.1007/s11042-016-4186-4

  26. Parvez M T, Gutub A-A (2008) RGB intensity based variable-bits image steganography. In: APSCC 2008—Proceedings of 3rd IEEE Asia-Pacific services computing conference. Yilan, pp 9–12

  27. Parvez M T, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng (KJSE) 38(1B):127–142

    Google Scholar 

  28. Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layr embedding. Optik 125(15):3972–3976

    Article  Google Scholar 

  29. Tang M, Hu J, Wen S, Zeng S (2015) Reversible and adaptive image steganographic method. Int J Electron Commun 69:1745–1754

    Article  Google Scholar 

  30. Yang C, Wang C, Sun H (2008) Information hiding technique based on blocked PVD. J Inf Manag 15(3):29–48

    Google Scholar 

  31. Yang C, Weng C, Lin Y, Liu K (2017) High-fidelity lossless data hiding based on predictors selection. Multimed Tools Appl. doi:10.1007/s11042-016-4133-4

  32. Yang C, Weng C, Tso H, Wang S (2011) A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J Syst Softw 84:669–678

    Article  Google Scholar 

  33. Wang J, Sun Y, Xu H, Chen K, Kim H, Joo S (2010) An improved section-wise exploiting modification direction method. Signal Process 90(11):2954–2964

    Article  MATH  Google Scholar 

  34. Wang Z, Bovik A (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84

    Article  Google Scholar 

  35. Zeng X, Li Z, Ping L (2012) Reversible data hiding scheme using reference pixel and multi-layer embedding. Int J Electron Commun 66(7):532–539

    Article  Google Scholar 

  36. Zhang W, Wang S, Zhang X (2007) Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun Lett 11(8):680–682

    Article  Google Scholar 

  37. Zhang W, Zhang X, Wang S (2007) A double layered ‘plus-minus one” data embedding scheme. IEEE Signal Process Lett 14(11):848–851

    Article  Google Scholar 

  38. Zhang X, Sun Z et al (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl. doi:10.1007/s11042-016-3521-0

  39. Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analyais and modification for enhanced security. Pattern Recogn Lett 331–339

  40. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  MathSciNet  Google Scholar 

  41. Zhang X, Zhang W, Wang S (2007) Efficient double-layered stegano- graphic embedding. Electron Lett 43(8):482–483

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Natural Science Foundation of P.R. China (11371127,11571124, 61572028), the Guangdong Applied Science and Technology Research Foundation of P.R. China (2016B020244003), the major Guangzhou University-industry Collaboration Innovation Project (201604016002,201704020203), and Young Teachers Scientific Research and Cultivating Foundation of South China Normal University (15KJ06).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-hong Huang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, Sy., Huang, Lh. & Yu, Ss. A novel adaptive data hiding based on improved EMD and interpolation. Multimed Tools Appl 77, 12563–12579 (2018). https://doi.org/10.1007/s11042-017-4905-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4905-5

Keywords

Navigation