Skip to main content
Log in

Secure data hiding scheme using shape generation algorithm: a key based approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Data hiding in images has evolved as one of the trusted methods of secure data communication and numerous approaches have been introduced over the years using gray scale images as the cover media. Most of the methods are based on data hiding in least significant bit planes of cover images. Many such methods purely depend on data substitution algorithms by defining a pattern in which data is embedded. One can gain access to the secret data in a few attempts, if the algorithm is known. Keeping this in view several approaches based on secret keys have also been proposed by researchers. This paper proposes an efficient data embedding scheme using a key and an embedding pattern generated through midpoint circle generation algorithm. The pattern can be applied to a carrier that is mapped onto a grid/image. The cryptosystem uses the concept of steganography and is computationally light and secure. The secret-key is generated in such a way that Avalanche effect is ensured except in very rare cases. The proposed data embedding method is shown to be robust and highly secure while maintaining good hiding capacity and imperceptibility. It is applicable for data hiding in a generic grid that could be of pixels or bits.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Cao H, Kot AC (2010) Lossless data embedding in electronic inks. IEEE Trans Inf Forensics Secur 5(2):314–323

    Article  Google Scholar 

  2. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  4. Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  5. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    Article  MATH  Google Scholar 

  6. Das S, Rane S, Vetro A (2010) Hiding information inside structured shapes. In: Acoustics speech and signal processing (ICASSP) IEEE, pp 1782–1785

  7. Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809

    Article  Google Scholar 

  8. Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15–23

    Article  Google Scholar 

  9. Gou H, Wu M (2005) Data hiding in curves with application to fingerprinting maps. IEEE Trans Signal Process 53(10):3988–4005

    Article  MathSciNet  MATH  Google Scholar 

  10. Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370–380

    Article  Google Scholar 

  11. Hearn D, Baker MP, Baker MP (2004) Computer graphics with openGL(3). Pearson Prentice Hall, Upper Saddle River, NJ

    Google Scholar 

  12. Huang HC, Chang FC (2013) Hierarchy-based reversible data hiding. Expert Syst Appl 40(1):34–43

    Article  Google Scholar 

  13. Janakiraman S, Thenmozhi K, Rajagopalan S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2014) Space filling curve for data filling: an embedded security approach. J Inf Technol 6:188–197

    Google Scholar 

  14. Johnson M, Ishwar P, Prabhakaran V, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10):2992–3006

    Article  MathSciNet  MATH  Google Scholar 

  15. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130

    Article  Google Scholar 

  16. Lee CF, Chen HL (2010) A novel data hiding scheme based on modulus function. J Syst Softw 83(5):832–843

    Article  MathSciNet  Google Scholar 

  17. Lee IS, Tsai WH (2009) Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recogn 42(7):1604–1611

    Article  MATH  Google Scholar 

  18. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  19. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (1):187–193

    Article  Google Scholar 

  20. Mary SC, Pallikondarajasekaran M, Chrisbinjeeva Y (2013) A novel approach for information security in ad hoc networks through secure key management. J Comput Sci 9(11):1556–1565

  21. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 1–12

    Google Scholar 

  22. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  23. Ohbuchi R, Masuda H, Aono M (1999) A shape-preserving data embedding algorithm for NURBS curves and surfaces. In: Cgi IEEE, p 180

  24. Ou B, Li X, Zhao Y, Ni R (2013) Reversible data hiding based on PDE predictor. J Syst Softw 86(10):2700–2709

    Article  Google Scholar 

  25. Revenkar PS, Anjum A, Gandhare WZ (2010) Survey of visual cryptography schemes. International Journal of Security and Its Applications 4(2):49–56

    Google Scholar 

  26. Shannon CE (1948) A mathematical theory of communication. J Bell System Technical 27:623–656

  27. Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press, Boca Raton

    Book  Google Scholar 

  28. Shyu SJ, Jiang HW (2013) General constructions for threshold multiple-secret visual cryptographic schemes. IEEE Trans Inf Forensics Secur 8(5):733–743

    Article  Google Scholar 

  29. Stallings W (2006) Cryptography and network security: principles and practices. Pearson Education, India

    Google Scholar 

  30. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  31. Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569–577

    Article  MathSciNet  Google Scholar 

  32. Wang CC, Kuo WC, Huang YC, Wuu LC (2017) A high capacity data hiding scheme based on re-adjusted GEMD. Multimedia Tools and Applications 1–15. https://doi.org/10.1007/s11042-017-4541-0

  33. Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995

    Article  Google Scholar 

  34. Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. Journal of Information Security and Applications 26:1–7

    Article  Google Scholar 

  35. Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573–576

    Article  Google Scholar 

  36. Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans Circuits Syst Video Technol 24(12):2077–2089

    Article  Google Scholar 

  37. Yan C, Zhang Y, Dai F, Wang X, Li L, Dai Q (2014) Parallel deblocking filter for HEVC on many-core processor. Electron Lett 50(5):367–368

    Article  Google Scholar 

  38. Yan C, Zhang Y, Dai F, Zhang J, Li L, Dai Q (2014) Efficient parallel HEVC intra-prediction on many-core processor. Electron Lett 50(11):805–806

    Article  Google Scholar 

  39. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  40. Zhang X (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inf Forensics Secur 6(1):53–58

    Article  Google Scholar 

  41. Zhao Z, Luo H (2012) Reversible data hiding based on Hilbert curve scan and histogram modification. Inf Technol J 11(2):209

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gyan Singh Yadav.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, G.S., Ojha, A. Secure data hiding scheme using shape generation algorithm: a key based approach. Multimed Tools Appl 77, 16319–16345 (2018). https://doi.org/10.1007/s11042-017-5200-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5200-1

Keywords

Navigation