Abstract
The protection of transmitted messages from being eavesdropped on the internet by a third party has always been an important research topic. The image steganography, which utilizes natural images to hide secret messages, is a widely used approach. The security of image steganography depends primarily on the undetectability of the transmitted stego-images. However, very few methods can handle customized adjustments to both the security level and embedding capacity simultaneously. Therefore, this study proposes a novel data hiding scheme utilizing a multidimensional reference tensor (MRT) with \(N\) dimensions and a side length of \(M\) to achieve these adjustments. The proposed method can freely adjust the embedding capacity from 1 bit per pixel (bpp) to 8 bpp, reduce the overall memory usage by up to nearly 99% based on a scalable index encoding (SIE) technique, and customize the level of security by simply altering the number of dimensions or the side length while maintaining a balance between the embedding capacity and visual imperceptibility. Based on experimental results, we demonstrated that the method could achieve a peak signal-to-noise ratio (PSNR) of 46.38 dB with an embedding capacity of 2 bpp, which is equivalent to the performance of state-of-the-art methods. Furthermore, compared with existing steganographic methods, the embedded message through the MRT is less susceptible to hacking owing to the factorial number of solutions for the MRT, which in this case is \(M\) to the power of \(N\).
Similar content being viewed by others
Data Availability
The experimental data and results that support the findings of this study are available in the USC-SIPI Image Database [33] with the following URL: https://sipi.usc.edu/database/.
References
Anushiadevi R, Amirtharajan R (2023) Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J Inf Secur Appl 72:103407
Anushiadevi R, Amirtharajan R (2023) Design and development of reversible data hiding-homomorphic encryption & rhombus pattern prediction approach. Multimed Tools Appl 2023:1–24
Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. Signal Process 66(3):357–372
Chan CK, Cheng M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chang CC, Chang JC, Chou YH, Wu HL (2017) A high embedding capacity data hiding scheme based upon permutation vectors. International Workshop on Digital Watermarking, pp 578–58
Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using Sudoku. Proceedings of the Third International Conference on Innovative Computing, Information and Control, Dalian, China, pp 17–1–17–5
Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun 29(3):375–384
Chen Z (2022) Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. J Comput Cogn Eng 1(3):103–108
Chen YY, Hu YC, Kao HY, Lin YH (2021) Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding. Complex Intell Syst 9:2699–2711. https://doi.org/10.1007/s40747-021-00391-0
Chu WC (2003) DCT-based image watermarking using subsampling. IEEE Trans Multimedia 5(1):34–38
Das S, Namasudra S (2023) Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure. IEEE Trans Industr Inf 19(1):821–829
Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J Electron Imaging 22(4):043007–043007
Felgenhauer B, Jarvis F (2005) Enumerating possible Sudoku grids. Mathematical Spectrum. http://www.afjarvis.staff.shef.ac.uk/sudoku/sudoku.pdf
Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. https://doi.org/10.1049/cit2.12093
He M, Liu Y, Chang CC, He M (2019) A mini-Sudoku matrix-based data embedding scheme with high payload. IEEE Access 7:141414–141425
Horng JH, Xu S, Chang CC, Chang CC (2020) An efficient data-hiding scheme based on multidimensional mini-Sudoku. Sensors 20(9):2739
Hsiao TC, Liu DX, Chen TL, Chen CC (2021) Research on image steganography based on Sudoku matrix. Symmetry 13(3):387
Kumar R, Chand S, Singh S (2018) An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl 77(11):13445–13457
Kumar R, Chand S, Singh S (2019) An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes. Multimed Tools Appl 78(16):22977–23001
Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inf Secur Appl 47:94–103
Lin CN, Chang CC, Lee WB, Lin J (2009) A novel secure data hiding scheme using a secret reference matrix. The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, pp 369–373
Lin SFD, Chen CF (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46(3):415–421
Lin J, Tsai CW, Yang CW, Liu KH (2022) A large payload data hiding scheme using scalable secret reference matrix. Symmetry 14(4):828
Malik A, Kumar R, Singh S (2018) A new image steganography technique based on pixel intensity and similarity in secret message. International Conference on Advances in Computing, Communication Control and Networking, Greater Noida, Uttar Pradesh, India, pp 828–831
Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77(12):15803–15827
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Namasudra S, Crespo RG, Kumar S (2022) Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec). Comput Electr Eng 100:108048
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Pavithran P, Mathew S, Namasudra S, Srivastava G (2022) A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. Comput Commun 188:1–12
Singh S (2020) Adaptive PVD and LSB based high capacity data hiding scheme. Multimed Tools Appl 79(25):18815–18837
Su GD, Chang CC, Lin CC (2020) A high capacity reversible data hiding in encrypted AMBTC-compressed images. IEEE Access 8:26984–27000
Su GD, Chang CC, Lin CC, Yao ZQ (2020) A secure high capacity Tetris-based scheme for data hiding. IET Image Proc 14(17):4633–4645
The USC-SIPI Image Database (1977) http://sipi.usc.edu/database/. Accessed 14 Mar 2023
Verma R, Kumari A, Anand A, Yadavalli V (2022) Revisiting shift cipher technique for amplified data security. J Comput Cogn Eng. https://doi.org/10.47852/bonviewJCCE2202261
Wani A, Khaliq R (2021) SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans Intell Technol 6(3):281–290
Wong K, Qi X, Tanaka K (2007) A DCT-based mod-4 steganographic method. Signal Process 87(6):1251–1263
Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. J Inf Secur Appl 26:1–7
Yu L, Zhao Y, Ni R, Li T (2010) Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP J Adv Sig Process 2010:876946. https://doi.org/10.1155/2010/876946
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1–3
Acknowledgements
This research was partially supported by the National Science and Technology Council, Taiwan, R.O.C. (Grant Nos. NSTC 112-2221-E-005-048, NSTC 111-2221-E-005-048, NSTC 112-2634-F-005-001-MBK, and NSTC 111-2634-F-005-001).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval
This article does not contain any studies with human participants performed by any authors.
Conflict of interests/Competing interests
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Lin, J., Liu, KH. & Lin, CL. A novel data hiding scheme based on multidimensional reference tensors. Multimed Tools Appl 83, 25695–25712 (2024). https://doi.org/10.1007/s11042-023-16526-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16526-z