Browse > Article
http://dx.doi.org/10.3837/tiis.2021.09.014

Adaptive data hiding scheme based on magic matrix of flexible dimension  

Wu, Hua (School of Information and Communication Engineering, Beijing Information Science & Technology University)
Horng, Ji-Hwei (Department of Electronic Engineering, National Quemoy University)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.9, 2021 , pp. 3348-3364 More about this Journal
Abstract
Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.
Keywords
Data hiding; embedding efficiency; flexible dimension; magic matrix;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. M. Thodi, J. J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process, vol. 16, no. 3, pp. 721-730, 2007.   DOI
2 Q. Li, X. Wang, X. Wang, et al., "An Encrypted Coverless Information Hiding Method Based on Generative Models," Information Sciences, vol. 553, no. 3, pp. 19-30, 2020.
3 O. S. Faragallah, M. A. Elaskily, A. F. Alenezi, et al., "Quadruple Histogram Shifting-based Reversible Information Hiding Approach for Digital Images," Multimed Tools Appl, vol. 80, pp. 26297-26317, 2021.   DOI
4 Y. Ke, M. Q. Zhang, J. Liu, et al., "Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain," IEEE Trans. Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2353-2365, 2020.   DOI
5 S. Gujjunoori, M. Oruganti, "Difference Expansion Based Reversible Data Embedding and Edge Detection," Multimed Tools Appl, vol. 78, pp. 25889-25917, 2019.   DOI
6 A. Roy, R. S. Chakraborty, "Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking," IEEE Trans. Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2377-2390, 2020.   DOI
7 P. V. Sabeen Govind, B. M. Varghese, M.V. Judy, "A high imperceptible data hiding technique using quorum function," Multimed Tools Appl, vol. 80, pp. 20527-20545, 2021.   DOI
8 Y. Jia, Z.Yin, X. Zhang, et al., "Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting," Signal Processing, vol. 163, pp. 238-246, 2019.   DOI
9 F. Peng, Y. Zhao, X. Zhang, et al., "Reversible Data Hiding Based on RSBEMD Coding and Adaptive Multi-segment Left and Right Histogram Shifting," Signal Processing: Image Communication, vol. 81, pp. 115715, 2020.   DOI
10 H. Liu, P. Su, M. Hsu, "An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing," KSII Transactions on Internet and Information Systems, vol. 14, no. 11, pp. 4537-4556, 2020.   DOI
11 W. Chen, C. C. Chang, S. W. Weng, et al., "Multi-layer mini-Sudoku based high-capacity data hiding method," IEEE Access, vol. 8, pp. 69256-69267, 2020.   DOI
12 Y. Liu, C. C. Chang, T. S. Nguyen, "High capacity turtle shell-based data hiding," IET Image Process, vol. 10, no. 2, pp. 130-137, 2016.   DOI
13 J. Lin, J. H. Horng, Y. J. Liu, et al., "An Anisotropic Reference Matrix for Image Steganography," Journal of Visual Communication and Image Representation, Vol. 74, pp. 102969, 2021.   DOI
14 C. F. Lee, J. J. Shen, S. Agrawal, et al., "Data Hiding Method Based on 3D Magic Cube," IEEE Access, Vol. 8, pp. 39445-39453, 2020.   DOI
15 J. H. Horng, S. Xu, C. C. Chang, et al., "An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu," Sensors, vol. 20, no. 9, pp. 2739, 2020.   DOI
16 X. Z. Xie, Y. Liu, C. C. Chang, "Extended Squared Magic Matrix for Embedding Secret Information with Large Payload," Multimed Tools Appl, vol. 78, pp. 19045-19059, 2019.   DOI
17 X. Z. Xie, C. C. Lin, C. C. Chang, "Data hiding based on a two-layer turtle shell matrix," Symmetry, vol. 10, no. 2, pp. 47, 2018.   DOI
18 C. C. Chang, "Adversarial learning for invertible steganography," IEEE Access, vol. 8, pp. 198425-198435, 2020.   DOI
19 Y. Liu, C. Yang, Q. Sun, "Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding," IEEE Access, vol. 6, pp. 5374-5378, 2017.   DOI
20 C. C. Chang, Y. Liu, T. S. Nguyen, "A novel turtle shell based scheme for data hiding," in Proc. of 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIHMSP), Kitakyushu, Japan, pp. 89-93, Aug. 2014.
21 C. Kim, "Data Hiding by an Improved Exploiting Modification Direction," Multimed Tools Appl, vol. 69, pp. 569-584, 2014.   DOI
22 I. Caciula, H. G. Coanda, D. Coltuc, "Multiple Moduli Prediction Error Expansion Reversible Data Hiding," Signal Processing: Image Communication, vol. 71, pp. 120-127, 2019.   DOI
23 M. He, Y. Liu, C. C. Chang, et al., "A mini-Sudoku matrix-based data embedding scheme with high payload," IEEE Access, vol. 7, pp. 141414-141425, 2019.   DOI
24 X. Li, W. Zhang, X. Gui, et al., "Efficient Reversible Data Hiding Based on Multiple Histograms Modification," IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 2016-2027, 2015.   DOI
25 B. Ou, Y. Zhao, "High Capacity Reversible Data Hiding Based on Multiple Histograms Modification," IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2329-2342, 2020.   DOI
26 D. Shehzad, T. Dag, "LSB Image Steganography Based on Blocks Matrix Determinant Method," KSII Transactions on Internet and Information Systems, vol. 13, no. 7, pp. 3778-3793, 2019.   DOI
27 R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan, "Undetectable least significant bit replacement steganography," Multimed Tools Appl, vol. 78, pp. 10565-10582, 2019.   DOI
28 C. K. Chan, L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.   DOI
29 X. Li, Y. Luo, W. Bian, "Retracing extended sudoku matrix for high-capacity image steganography," Multimed Tools Appl, vol. 80, pp. 18627-18651, 2021.   DOI
30 C. C. Chang, Y. C. Chou, T. D. Kieu, "An information hiding scheme using Sudoku," in Proc. of 3rd Int. Conf. Innov. Comput. Inf. Control (ICICIC), Dalian, China, pp. 17-22, Jun. 2008.
31 L. Li, W. Zhang, C. Qin, et al., "Adversarial batch image steganography against CNN-based pooled steganalysis," Signal Processing, vol. 181, pp. 107920, 2021.   DOI
32 B. Ou, X. Li, Y. Zhao, et al., "Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding," IEEE Trans. Image Process, vol. 22, no. 12, pp. 5010-5021, 2013.   DOI
33 C. C. Chang, "Cryptospace invertible steganography with conditional generative adversarial networks," Security and Communication Networks, vol. 2021, 2021.