Binary nonogram puzzle based data hiding technique for data security

被引:0
|
作者
Kamil, Samar [1 ,2 ]
Abdullah, Siti Norul Huda Sheikh [1 ]
Hasan, Mohammad Kamrul [1 ]
Alomari, Yazan M. [3 ]
Alyasseri, Zaid [4 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Middle Tech Univ, Tech Coll Management, Dept Business Adm Tech, Baghdad 10047, Iraq
[3] Imam Abdulrahman bin Faisal Univ, Coll Appl Studies & Community Serv, Dammam, Saudi Arabia
[4] Univ Kufa, Informat Technol Res & Dev Ctr ITRDC, Kufa 54001, Najaf, Iraq
关键词
Data Security; Steganography; Least Significant Bit; Nonogram Puzzle; Binary Nonogram Puzzle; IMAGE STEGANOGRAPHY; LIGHTWEIGHT; INTERNET;
D O I
10.1007/s11042-023-15618-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security is one of the critical challenges for digital information. The existing steganography algorithms hide confidential data in the cover media to preserve the presence of hidden data. One type of steganography algorithm is a puzzle-based algorithm such as sudoku, magic cube, and basic nonogram puzzle. These puzzles depend on an auxiliary reference matrix for communication with the receiver. However, using a reference matrix is prone to a statistical histogram attack because image data hiding pixels are fixed. The challenging task here is to design a secured secret data technique that hides the secret data bits in the cover using a suitable puzzle without communicating the reference matrix with the receiver. This paper proposes a new Binary Nonogram Puzzle (BNP) technique. The BNP is based on two elements: searching the BNP indexes based on LSB of the cover pixel and hiding the secret data in random pixel based on the index information. The first row and column for each block are considered an index for the remaining block elements used for data hiding. We also identify the position to hide the secret data that calculates vertical and horizontal summation to indicate a suitable index with the specified rule. The effectiveness of the BNP was tested on the standard dataset images (USC-SIPI image database) and evaluated using Peak signal-to-noise ratio (PSNR) and Mean Square Error (MSE). The results showed that BNP achieves high PSNR and low MSE compared to the existing puzzles (Magic Cube and Basic Nonogram puzzle) and guarantees a better stego image quality.
引用
收藏
页码:4951 / 4992
页数:42
相关论文
共 50 条
  • [1] Binary nonogram puzzle based data hiding technique for data security
    Samar Kamil
    Siti Norul Huda Sheikh Abdullah
    Mohammad Kamrul Hasan
    Yazan M. Alomari
    Zaid Alyasseri
    Multimedia Tools and Applications, 2024, 83 : 4951 - 4992
  • [2] A Data Hiding Technique Based on Magic Squares
    Kurup, Sujitha
    Rodrigues, Anjana
    Bhise, Archana
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA MINING AND ADVANCED COMPUTING (SAPIENCE), 2016, : 175 - 179
  • [3] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778
  • [4] A novel technique for data hiding
    Ismail I.A.
    El-Zoghdy S.F.
    Abdo A.A.
    International Journal of Computers and Applications, 2010, 32 (01) : 32 - 37
  • [5] Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
    Ragab, Mahmoud
    Alshehri, Samah
    Alhadrami, Hani A.
    Kateb, Faris
    Ashary, Ehab Bahaudien
    Abdel-khalek, S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1323 - 1338
  • [6] A reversible data hiding scheme based on the Sudoku technique
    Nguyen, Thai-Son
    Chang, Chin-Chen
    DISPLAYS, 2015, 39 : 109 - 116
  • [7] Local binary pattern-based reversible data hiding
    Sahu, Monalisa
    Padhy, Neelamadhab
    Gantayat, Sasanko Sekhar
    Sahu, Aditya Kumar
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022, 7 (04) : 695 - 709
  • [8] Data Hiding and Security for XMLDatabase: A TRBAC-Based Approach
    ZHANG Wan-song
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 293 - 296
  • [9] Application of Data Hiding in Audio-Video Using Anti Forensics Technique for Authentication and Data Security
    Moon, Sunil K.
    Raut, Rajeshree D.
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 1110 - 1115
  • [10] A unique database synthesis technique for coverless data hiding
    Majumder, Anandaprova
    Kundu, Sumana
    Changder, Suvamoy
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2023, 96