Skip to main content
Log in

A novel data hiding scheme based on multidimensional reference tensors

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The protection of transmitted messages from being eavesdropped on the internet by a third party has always been an important research topic. The image steganography, which utilizes natural images to hide secret messages, is a widely used approach. The security of image steganography depends primarily on the undetectability of the transmitted stego-images. However, very few methods can handle customized adjustments to both the security level and embedding capacity simultaneously. Therefore, this study proposes a novel data hiding scheme utilizing a multidimensional reference tensor (MRT) with \(N\) dimensions and a side length of \(M\) to achieve these adjustments. The proposed method can freely adjust the embedding capacity from 1 bit per pixel (bpp) to 8 bpp, reduce the overall memory usage by up to nearly 99% based on a scalable index encoding (SIE) technique, and customize the level of security by simply altering the number of dimensions or the side length while maintaining a balance between the embedding capacity and visual imperceptibility. Based on experimental results, we demonstrated that the method could achieve a peak signal-to-noise ratio (PSNR) of 46.38 dB with an embedding capacity of 2 bpp, which is equivalent to the performance of state-of-the-art methods. Furthermore, compared with existing steganographic methods, the embedded message through the MRT is less susceptible to hacking owing to the factorial number of solutions for the MRT, which in this case is \(M\) to the power of \(N\).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

The experimental data and results that support the findings of this study are available in the USC-SIPI Image Database [33] with the following URL: https://sipi.usc.edu/database/.

References

  1. Anushiadevi R, Amirtharajan R (2023) Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J Inf Secur Appl 72:103407

    Google Scholar 

  2. Anushiadevi R, Amirtharajan R (2023) Design and development of reversible data hiding-homomorphic encryption & rhombus pattern prediction approach. Multimed Tools Appl 2023:1–24

    Google Scholar 

  3. Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. Signal Process 66(3):357–372

    Article  Google Scholar 

  4. Chan CK, Cheng M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  ADS  Google Scholar 

  5. Chang CC, Chang JC, Chou YH, Wu HL (2017) A high embedding capacity data hiding scheme based upon permutation vectors. International Workshop on Digital Watermarking, pp 578–58

  6. Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using Sudoku. Proceedings of the Third International Conference on Innovative Computing, Information and Control, Dalian, China, pp 17–1–17–5

  7. Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun 29(3):375–384

    Article  Google Scholar 

  8. Chen Z (2022) Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. J Comput Cogn Eng 1(3):103–108

    MathSciNet  Google Scholar 

  9. Chen YY, Hu YC, Kao HY, Lin YH (2021) Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding. Complex Intell Syst 9:2699–2711. https://doi.org/10.1007/s40747-021-00391-0

    Article  Google Scholar 

  10. Chu WC (2003) DCT-based image watermarking using subsampling. IEEE Trans Multimedia 5(1):34–38

    Article  MathSciNet  Google Scholar 

  11. Das S, Namasudra S (2023) Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure. IEEE Trans Industr Inf 19(1):821–829

    Article  Google Scholar 

  12. Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J Electron Imaging 22(4):043007–043007

    Article  ADS  Google Scholar 

  13. Felgenhauer B, Jarvis F (2005) Enumerating possible Sudoku grids. Mathematical Spectrum. http://www.afjarvis.staff.shef.ac.uk/sudoku/sudoku.pdf

  14. Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. https://doi.org/10.1049/cit2.12093

    Article  Google Scholar 

  15. He M, Liu Y, Chang CC, He M (2019) A mini-Sudoku matrix-based data embedding scheme with high payload. IEEE Access 7:141414–141425

    Article  Google Scholar 

  16. Horng JH, Xu S, Chang CC, Chang CC (2020) An efficient data-hiding scheme based on multidimensional mini-Sudoku. Sensors 20(9):2739

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  17. Hsiao TC, Liu DX, Chen TL, Chen CC (2021) Research on image steganography based on Sudoku matrix. Symmetry 13(3):387

    Article  ADS  Google Scholar 

  18. Kumar R, Chand S, Singh S (2018) An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl 77(11):13445–13457

    Article  Google Scholar 

  19. Kumar R, Chand S, Singh S (2019) An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes. Multimed Tools Appl 78(16):22977–23001

    Article  Google Scholar 

  20. Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inf Secur Appl 47:94–103

    Google Scholar 

  21. Lin CN, Chang CC, Lee WB, Lin J (2009) A novel secure data hiding scheme using a secret reference matrix. The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, pp 369–373

  22. Lin SFD, Chen CF (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46(3):415–421

    Article  Google Scholar 

  23. Lin J, Tsai CW, Yang CW, Liu KH (2022) A large payload data hiding scheme using scalable secret reference matrix. Symmetry 14(4):828

    Article  ADS  Google Scholar 

  24. Malik A, Kumar R, Singh S (2018) A new image steganography technique based on pixel intensity and similarity in secret message. International Conference on Advances in Computing, Communication Control and Networking, Greater Noida, Uttar Pradesh, India, pp 828–831

  25. Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77(12):15803–15827

    Article  Google Scholar 

  26. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  ADS  Google Scholar 

  27. Namasudra S, Crespo RG, Kumar S (2022) Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec). Comput Electr Eng 100:108048

    Article  Google Scholar 

  28. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  29. Pavithran P, Mathew S, Namasudra S, Srivastava G (2022) A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. Comput Commun 188:1–12

    Article  Google Scholar 

  30. Singh S (2020) Adaptive PVD and LSB based high capacity data hiding scheme. Multimed Tools Appl 79(25):18815–18837

    Article  Google Scholar 

  31. Su GD, Chang CC, Lin CC (2020) A high capacity reversible data hiding in encrypted AMBTC-compressed images. IEEE Access 8:26984–27000

    Article  Google Scholar 

  32. Su GD, Chang CC, Lin CC, Yao ZQ (2020) A secure high capacity Tetris-based scheme for data hiding. IET Image Proc 14(17):4633–4645

    Article  Google Scholar 

  33. The USC-SIPI Image Database (1977) http://sipi.usc.edu/database/. Accessed 14 Mar 2023

  34. Verma R, Kumari A, Anand A, Yadavalli V (2022) Revisiting shift cipher technique for amplified data security. J Comput Cogn Eng. https://doi.org/10.47852/bonviewJCCE2202261

  35. Wani A, Khaliq R (2021) SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans Intell Technol 6(3):281–290

    Article  Google Scholar 

  36. Wong K, Qi X, Tanaka K (2007) A DCT-based mod-4 steganographic method. Signal Process 87(6):1251–1263

    Article  Google Scholar 

  37. Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. J Inf Secur Appl 26:1–7

    CAS  Google Scholar 

  38. Yu L, Zhao Y, Ni R, Li T (2010) Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP J Adv Sig Process 2010:876946. https://doi.org/10.1155/2010/876946

  39. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1–3

    Article  Google Scholar 

Download references

Acknowledgements

This research was partially supported by the National Science and Technology Council, Taiwan, R.O.C. (Grant Nos. NSTC 112-2221-E-005-048, NSTC 111-2221-E-005-048, NSTC 112-2634-F-005-001-MBK, and NSTC 111-2634-F-005-001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jason Lin.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants performed by any authors.

Conflict of interests/Competing interests

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, J., Liu, KH. & Lin, CL. A novel data hiding scheme based on multidimensional reference tensors. Multimed Tools Appl 83, 25695–25712 (2024). https://doi.org/10.1007/s11042-023-16526-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16526-z

Keywords

Navigation