Data Hiding Scheme Based on Quad General Difference Expansion Cluster

Ahmad Juniar Ilham, Tohari Ahmad, Ntivuguruzwa Jean De La Croix, Pascal Maniriho, Maurice Ntahobari

Abstract


For some periods, information technology has developed, but there are some issues with its data security. For this reason, exploring the data hiding method is relevant, which is an appropriate study in the information concealment paradigm. Several factors must be considered in its implementation, such as the capacity of the confidential data and the quality of the generated stego file. Nevertheless, it is difficult to solve those two problems simultaneously in actual application. We often need to choose either one of them, which is more suitable for a specific environment. In this research, those problems are approached by extending the Quad General Difference Expansion Cluster (QGDEC) method combined with fuzzy logic in the image environment. We use the cluster in the QGDEC, which aims to ensure that the pixel difference is not significant so that the quality of the stego can be maintained. The confidential data can be embedded in multiple layers based on several image characteristics, which can be processed using fuzzy logic. The result of the experiment denotes that the proposed method obtains about 20 dB higher than that of the previous ones regarding the Peak Signal to Noise Ratio (PSNR) for the same capacity of the secret. It depicts that the proposed method is more applicable than the previous ones by considering the specific message size and its respective characteristics.

Keywords


Data hiding; information hiding; steganography; information security; network infrastructure.

Full Text:

PDF

References


G. Zhang, Z. Yang, H. Xie, and W. Liu, "A secure authorized deduplication scheme for cloud data based on blockchain," Inf. Process. Manag., vol. 58, no. 3, p. 102510, 2021, doi: 10.1016/j.ipm.2021.102510.

A. A. Gutub and K. A. Alaseri, "Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing," J. King Saud Univ. - Comput. Inf. Sci., no. in press, Available online 28 June 2019, 2019, doi: 10.1016/j.jksuci.2019.06.014.

H. Agrawal and A. A. Agarkar, "LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid," Heliyon, vol. 5(3), 2019, doi: 10.1504/IJICS.2019.10019163.

M. Wrzeszcz, Å. Dutka, R. G. SÅ‚ota, and J. Kitowski, “New approach to global data access in computational infrastructures,†Futur. Gener. Comput. Syst., vol. 125, pp. 575–589, 2021, doi: 10.1016/j.future.2021.06.054.

P. Puteaux, S. Y. Ong, K. S. Wong, and W. Puech, "A survey of reversible data hiding in encrypted images – The first 12 years," J. Vis. Commun. Image Represent., vol. 77, no. September 2020, p. 103085, 2021, doi: 10.1016/j.jvcir.2021.103085.

A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar, "Digital audio steganography: Systematic review, classification, and analysis of the current state of the art," Comput. Sci. Rev., vol. 38, p. 100316, 2020, doi: 10.1016/j.cosrev.2020.100316.

Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, "Video steganography: A review," Neurocomputing, vol. 335, pp. 238–250, 2019, doi: 10.1016/j.neucom.2018.09.091.

P. Maniriho and T. Ahmad, "Information hiding scheme for digital images using difference expansion and modulus function," J. King Saud Univ. - Comput. Inf. Sci., vol. 31, no. 3, pp. 335–347, 2019, doi: 10.1016/j.jksuci.2018.01.011.

F. R. Shareef, "A novel crypto technique based ciphertext shifting," Egypt. Informatics J., vol. 21, no. 2, pp. 83–90, 2020, doi: 10.1016/j.eij.2019.11.002.

C. C. Chen, C. C. Chang, and K. Chen, "High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels," J. Vis. Commun. Image Represent., vol. 76, no. January 2020, p. 103060, 2021, doi: 10.1016/j.jvcir.2021.103060.

D. Huang and J. Wang, "Image Communication High-capacity reversible data hiding in encrypted image based on specific encryption process," Signal Process. Image Commun., vol. 80, no. July 2019, p. 115632, 2020, doi: 10.1016/j.image.2019.115632.

B. Guan and D. Xu, "An efficient high-capacity reversible data hiding scheme for encrypted images," J. Vis. Commun. Image Represent., vol. 66, p. 102744, 2020, doi: 10.1016/j.jvcir.2019.102744.

S. Yi, Y. Zhou, and Z. Hua, "Signal Processing : Image Communication Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion," Signal Process. Image Commun., vol. 64, no. March, pp. 78–88, 2018, doi: 10.1016/j.image.2018.03.001.

X. Wang, C. C. Chang, and C. C. Lin, "Reversible data hiding in encrypted images with block-based adaptive MSB encoding," Inf. Sci. (Ny)., vol. 567, pp. 375–394, 2021, doi: 10.1016/j.ins.2021.02.079.

H. Ren, W. Lu, and B. Chen, "Reversible data hiding in encrypted binary images by pixel prediction," Signal Processing, vol. 165, pp. 268–277, 2019, doi: 10.1016/j.sigpro.2019.07.020.

R. Kumar and K. Jung, "Robust reversible data hiding scheme based on two-layer emb e dding strategy," Inf. Sci. (Ny)., vol. 512, pp. 96–107, 2020, doi: 10.1016/j.ins.2019.09.062.

A. J. Ilham, P. H. Bawa, and T. Ahmad, "Protecting Secret Data using RDE and Fuzzy Logic to Specify the Embedding Level," Proc. 2019 IEEE Int. Conf. Signal Image Process. Appl., vol. 19, pp. 254–258, 2019, doi: https://doi.org/10.1109/ICSIPA45851.2019.8977778.

S. Sajasi, A. Masoud, and E. Moghadam, "A High Quality Image Steganography Scheme Based on Fuzzy Inference System," 2013 13th Iran. Conf. Fuzzy Syst., pp. 1–6, 2013, doi: 10.1109/IFSC.2013.6675666.

Z. Ashraf, M. L. Roy, P. K. Muhuri, and Q. M. D. Lohani, "A Novel Image Steganography Approach Based on Interval Type-2 Fuzzy Similarity," 2018 IEEE Int. Conf. Fuzzy Syst., vol. 18, pp. 1–8, 2018, doi: https://doi.org/10.1109/FUZZ-IEEE.2018.8491582.

J. Hou, B. Ou, H. Tian, and Z. Qin, "Reversible data hiding based on multiple histograms modification and deep neural networks," Signal Process. Image Commun., vol. 92, no. December 2020, 2021, doi: 10.1016/j.image.2020.116118.

J. Wang, N. Mao, X. Chen, J. Ni, and C. Wang, "Multiple histograms based reversible data hiding by using FCM clustering," Signal Processing, vol. 159, pp. 193–203, 2019, doi: 10.1016/j.sigpro.2019.02.013.

Y. Tsai, D. Tsai, and C. Liu, "Reversible data hiding scheme based on neighboring pixel differences," Digit. Signal Process., vol. 23, no. 3, pp. 919–927, 2013, doi: 10.1016/j.dsp.2012.12.014.

S. Das, A. K. Sunaniya, R. Maity, and N. P. Maity, "Efficient FPGA implementation and verification of difference expansion based reversible watermarking with improved time and resource utilization," Microprocess. Microsyst., vol. 83, no. December 2020, p. 103732, 2021, doi: 10.1016/j.micpro.2020.103732.

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299–326, 2019, doi: 10.1016/j.neucom.2018.06.075.

S. R. Muttaqi and T. Ahmad, "A new data hiding method for protecting bigger secret data," 2019, doi: 10.1109/ICTS.2019.8850938.

A. M. Alattar, "Reversible watermark using difference expansion of quads," IEEE Int. Conf. Acoust. Speech, Signal Process., vol. 3, no. 1, pp. 377–380, 2004, doi: 10.1109/ICASSP.2004.1326560.

D. Lou, M. Hu, and J. Liu, "Multiple layer data hiding scheme for medical images," Comput. Stand. Interfaces, vol. 31, pp. 329–335, 2009, doi: 10.1016/j.csi.2008.05.009.

X. Yuan, Z. Liu, and E. S. Lee, "Center-of-gravity fuzzy systems based on normal fuzzy implications," Comput. Math. with Appl., vol. 61, no. 9, pp. 2879–2898, 2011, doi: 10.1016/j.camwa.2011.03.074.

A. P. Rahardjo, “Penggunaan Klaster Piksel untuk Meningkatkan Kinerja Reduced Difference Expansion (The Use of Pixel Clusters to Improve the Performance of Reduced Difference Expansion),†Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia, 2014.

"eMicrobes Digital Library.".

"The USC-SIPI Image Database.".




DOI: http://dx.doi.org/10.18517/ijaseit.12.6.16002

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development