Binary nonogram puzzle based data hiding technique for data security

被引:0
|
作者
Kamil, Samar [1 ,2 ]
Abdullah, Siti Norul Huda Sheikh [1 ]
Hasan, Mohammad Kamrul [1 ]
Alomari, Yazan M. [3 ]
Alyasseri, Zaid [4 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Middle Tech Univ, Tech Coll Management, Dept Business Adm Tech, Baghdad 10047, Iraq
[3] Imam Abdulrahman bin Faisal Univ, Coll Appl Studies & Community Serv, Dammam, Saudi Arabia
[4] Univ Kufa, Informat Technol Res & Dev Ctr ITRDC, Kufa 54001, Najaf, Iraq
关键词
Data Security; Steganography; Least Significant Bit; Nonogram Puzzle; Binary Nonogram Puzzle; IMAGE STEGANOGRAPHY; LIGHTWEIGHT; INTERNET;
D O I
10.1007/s11042-023-15618-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security is one of the critical challenges for digital information. The existing steganography algorithms hide confidential data in the cover media to preserve the presence of hidden data. One type of steganography algorithm is a puzzle-based algorithm such as sudoku, magic cube, and basic nonogram puzzle. These puzzles depend on an auxiliary reference matrix for communication with the receiver. However, using a reference matrix is prone to a statistical histogram attack because image data hiding pixels are fixed. The challenging task here is to design a secured secret data technique that hides the secret data bits in the cover using a suitable puzzle without communicating the reference matrix with the receiver. This paper proposes a new Binary Nonogram Puzzle (BNP) technique. The BNP is based on two elements: searching the BNP indexes based on LSB of the cover pixel and hiding the secret data in random pixel based on the index information. The first row and column for each block are considered an index for the remaining block elements used for data hiding. We also identify the position to hide the secret data that calculates vertical and horizontal summation to indicate a suitable index with the specified rule. The effectiveness of the BNP was tested on the standard dataset images (USC-SIPI image database) and evaluated using Peak signal-to-noise ratio (PSNR) and Mean Square Error (MSE). The results showed that BNP achieves high PSNR and low MSE compared to the existing puzzles (Magic Cube and Basic Nonogram puzzle) and guarantees a better stego image quality.
引用
收藏
页码:4951 / 4992
页数:42
相关论文
共 50 条
  • [31] Efficient Image Reversible Data Hiding Technique Based on Interpolation Optimization
    Hassan, Fatuma Saeid
    Gutub, Adnan
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8441 - 8456
  • [32] Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique
    Sun, Shan
    Yin, Zhaoxia
    Tang, Jin
    Luo, Bin
    INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2017, 2017, 202 : 111 - 118
  • [33] Scramble and Transform: An Image Data Hiding Technique
    Rezaei, Mohammad
    Moghaddam, Saeed Montazeri
    2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019), 2019, : 1874 - 1878
  • [34] A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
    Kanwal, Saima
    Tao, Feng
    Almogren, Ahmad
    Rehman, Ateeq Ur
    Taj, Rizwan
    Radwan, Ayman
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 134 (01): : 201 - 219
  • [35] Data Hiding Technique By Ternary Hamming Codes
    Wang, Jyun-Jie
    Chen, Hong-Da
    Yang, Ting-Ya
    Chen, Houshou
    Lin, Chi-Yuan
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 163 - +
  • [36] New Technique for Hiding Data in Audio File
    Atoum, Mohammed Salem
    Al-Rababah, Osamah Abdulgader
    Al-Attili, Alaa Ismat
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 173 - 177
  • [37] New Technique for Hiding Data in Audio File
    Al-Attili, Alaa Ismat
    Al-Rababah, Osamah Abdulgader
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (02): : 183 - 187
  • [38] A counter-embedding IPVO based reversible data hiding technique
    Kris Manohar
    The Duc Kieu
    Multimedia Tools and Applications, 2021, 80 : 5873 - 5900
  • [39] An Algorithm for Enhanced Image Security with Reversible Data Hiding
    Mohan, Arun K.
    Saranya, M. R.
    Anusudha, K.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1042 - 1045
  • [40] A weight-based data hiding method for binary image using selective binary numeral system
    Po-Hsian, Huang
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05) : 429 - 444