Efficient Image Reversible Data Hiding Technique Based on Interpolation Optimization

被引:48
作者
Hassan, Fatuma Saeid [1 ]
Gutub, Adnan [1 ]
机构
[1] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
关键词
Image steganography; Interpolation; Lossless data embedding; Neighbor mean interpolation; Secret data;
D O I
10.1007/s13369-021-05529-3
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Reversible data hiding (RDH) within images is the process of hiding secret data into a cover image in a way that the image can be completely recovered after extracting the embedded data. The performance of the RDH methods depends on making a trade of between the embedding capacity and the image quality. The aim of this paper is to improve RDH method within images using interpolation-based scheme. The proposed interpolation-based RDH (IRDH) scheme improves the embedding capacity of the state-of-the-art Lee and Huang's IRDH scheme with better image quality. The proposed scheme is choosing the existing enhanced neighbor mean interpolation (ENMI) and modified neighbor mean interpolation (MNMI) techniques to scale-up the original image before embedding the secret data. It is then hiding the sensitive bits via smartly benefitting from the principle idea of Lee and Huang's embedding technique. The experiments were conducted on eight standard images to evaluate the performance of the proposed scheme. The investigational results demonstrate that the proposed technique achieves the highest embedding capacity among the most striking similar works of Jung and Yoo's scheme, Lee and Huang's method, and Chang et al.'s approach, winning with attractive image quality.
引用
收藏
页码:8441 / 8456
页数:16
相关论文
共 48 条
[1]  
Agrawal S, 2016, 2016 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS)
[2]  
Al-Juaid N.A., 2018, J Inf Secur Cybercrimes Res (JISCR), V1, P8, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[3]   Combining RSA and audio steganography on personal computers for enhancing security [J].
Al-Juaid, Nouf ;
Gutub, Adnan .
SN APPLIED SCIENCES, 2019, 1 (08)
[4]   Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections [J].
Al-Roithy, Budoor Obid ;
Gutub, Adnan A. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (12) :167-176
[5]  
Al-Shaarani F., 2020, RAS Eng Technol, V1, P1, DOI DOI 10.21070/JIHR.V12I2.985
[6]   Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses [J].
Alanazi, Norah ;
Khan, Esam ;
Gutub, Adnan .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 34 (04) :1343-1356
[7]   Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications [J].
Alassaf, Norah ;
Gutub, Adnan .
INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2019, 10 (04) :1-15
[8]   Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability [J].
AlKhodaidi, Taghreed ;
Gutub, Adnan .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) :3403-3423
[9]   Securing Data via Cryptography and Arabic Text Steganography [J].
Alkhudaydi M. ;
Gutub A. .
SN Computer Science, 2021, 2 (1)
[10]   Integrity verification for digital Holy Quran verses using cryptographic hash function and compression [J].
Almazrooie, Mishal ;
Samsudin, Azman ;
Gutub, Adnan Abdul-Aziz ;
Salleh, Muhammad Syukri ;
Omar, Mohd Adib ;
Hassan, Shahir Akram .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 32 (01) :24-34