Reversible Logic-Based Hexel Value Differencing-A Spatial Domain Steganography Method for Hexagonal Image Processing

被引:4
作者
Cevik, Taner [1 ]
Cevik, Nazife [1 ]
Rasheed, Jawad [2 ,3 ,4 ]
Asuroglu, Tunc [5 ]
Alsubai, Shtwai [6 ]
Turan, Mehmet [7 ]
机构
[1] Istanbul Arel Univ, Dept Comp Engn, TR-34537 Istanbul, Turkiye
[2] Bogazici Univ, Deep Learning & Med Image Anal Lab, TR-34342 Istanbul, Turkiye
[3] Istanbul Nisantasi Univ, Dept Software Engn, TR-34398 Istanbul, Turkiye
[4] Istanbul Sabahattin Zaim Univ, Dept Comp Engn, TR-34303 Istanbul, Turkiye
[5] Tampere Univ, Fac Med & Hlth Technol, Tampere 33720, Finland
[6] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci Al Kharj, Dept Comp Sci, Al Kharj 11942, Saudi Arabia
[7] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkiye
关键词
Heptad; hexel; hexagonal image processing; pixel-value-differencing; reversible logic-based hexel value differencing; steganography; STEGANALYSIS;
D O I
10.1109/ACCESS.2023.3326857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The field of steganography has witnessed considerable advancements in square-pixel-based image processing (SIP). However, the application of steganography in Hexel (Hexagonal pixel)-based Image Processing (HIP) is still underexplored. This study introduces a pioneering spatial steganography method called the Reversible Logic-Based Hexel Value Differencing (RLBHVD) method in the HIP domain. Our approach draws inspiration from Pixel-Value-Differencing (PVD), a SIP fundamental spatial-domain (S-D) steganography method. Initially, the image is transformed into the HIP domain using the custom software infrastructure developed for this project. Due to the absence of commercial equipment capable of producing HIP-domain images, traditional digital imaging systems are employed with their sensor components, analog-to-digital conversion units, and square-pixel-based displays. Once the image is converted, it is partitioned into standardized heptads, each comprising seven hexels. Simultaneously, the secret message is segmented for embedding into the hexels within each heptad. Unlike SIP-domain PVD, which embeds segments into independent pixel pairs, our method performs iterative embedding within each heptad. Additionally, we leverage Feynman gates, a core element of reversible logic, to achieve retrieval of both the cover image and the secret message. Unlike PVD in SIP, our approach enables reversibility in the recovery process. Experimental results demonstrate that our proposed method, RLBHVD, outperforms its SIP counterpart, PVD, by achieving a low Mean Squared Error (MSE), high Peak Signal-to-Noise Ratio (PSNR), and significant similarity between the stego-image and cover image histograms. These findings highlight the efficacy and superiority of our HIP-based steganography approach in comparison to existing SIP methods.
引用
收藏
页码:118186 / 118203
页数:18
相关论文
共 49 条
[1]  
Allen J.D., 2005, 2005 5 INT C INF COM, P73, DOI [10.1109/ICICS.2005.1689007, DOI 10.1109/ICICS.2005.1689007]
[2]   Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity [J].
Andono, Pulung Nurtantio ;
Setiadi, De Rosal Ignatius Moses .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (03) :3561-3580
[3]  
[Anonymous], 2023, VOLUME, V11
[4]   FTSH: a framework for transition from square image processing to hexagonal image processing [J].
Cevik, Taner ;
Fettahoglu, Mustafa ;
Cevik, Nazife ;
Yilmaz, Serdar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) :7021-7048
[5]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[6]   A novel image data hiding scheme with diamond encoding [J].
Wu H.-C. ;
Chao R.-M. ;
Lee C.-C. ;
Chu Y.-P. .
EURASIP Journal on Information Security, 2009 (1)
[7]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[8]  
Coleman S, 2009, LECT NOTES COMPUT SC, V5716, P920, DOI 10.1007/978-3-642-04146-4_98
[9]   An overview of steganography techniques applied to the protection of biometric data [J].
Douglas, Mandy ;
Bailey, Karen ;
Leeney, Mark ;
Curran, Kevin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) :17333-17373
[10]   QUANTUM-MECHANICAL COMPUTERS [J].
FEYNMAN, RP .
FOUNDATIONS OF PHYSICS, 1986, 16 (06) :507-531