Reversible data hiding method by extending reduced difference expansion

(1) * Zainal Syahlan Mail (Department of Informatics, Institut Teknologi Sepuluh Nopember (ITS), Indonesia)
(2) Tohari Ahmad Mail (Department of Informatics, Institut Teknologi Sepuluh Nopember (ITS), Indonesia)
*corresponding author

Abstract


To keep hiding secret data in multimedia files, such as video, audio, and image considers essential for information security. Image, for instance, as the media aids data insertion securely. The use of insertion technique must ensure a reliable process on retaining data quality and capacity. However, a trade-off between the resulted image quality and the embedded payload capacity after the embedding process often occurs. Therefore, this research aims at extending the existing method of integrating confidential messages using the Reduced Difference Expansion (RDE), transform into a medical image by changing the base point, block size, and recalculating of difference. The results display that the proposed method enhances the quality of the stego image and capacity of the hidden message.

Keywords


Steganography; Difference expansion; Reduced difference expansion; Hiding data; Secret data

   

DOI

https://doi.org/10.26555/ijain.v5i2.351
      

Article metrics

Abstract views : 88 | PDF views : 27

   

Cite

   

Full Text

Download

References


[1] C. Renato and N. María, “Technologies’ Application, Rules, and Challenges of Information Security on Information and Communication Technologies,” Proc. - 2015 Asia-Pacific Conf. Comput. Syst. Eng. APCASE 2015, pp. 380–386, 2015, doi: 10.1109/APCASE.2015.74.

[2] X. Zhang, J. Wang, Z. Wang, and H. Cheng, “Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 26, no. 9, pp. 1622–1631, 2015, doi: 10.1109/TCSVT.2015.2433194.

[3] W. Zhang, K. Ma, and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, pp. 118–127, 2014, doi: 10.1016/j.sigpro.2013.06.023.

[4] K. S. Seethalakshmi, Usha B A, and Sangeetha K N, “Security enhancement in image steganography using neural networks and visual cryptography,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016, pp. 396–403, doi: 0.1109/CSITSS.2016.7779393.

[5] M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process. Image Commun., vol. 65, no. March, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.

[6] M. A. P. T. Dileep, Alka, K.Anusudha, “An Efficient Reversible Data Hiding Technique In Encrypted Images Based On Chaotic Map,” Int. Conf. Control. Commun. Comput. Technol., pp. 539–543, 2015, doi: 10.1109/ICCICCT.2015.7475338.

[7] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi: 10.1147/sj.353.0313.

[8] Y. Tsai, D. Tsai, and C. Liu, “Reversible data hiding scheme based on neighboring pixel differences,” Digit. Signal Process., vol. 23, no. 3, pp. 919–927, 2013, doi: 10.1016/j.dsp.2012.12.014.

[9] S. Weng, Y. Liu, J. Pan, and N. Cai, “Reversible data hiding based on flexible block-partition and adaptive block-modification strategy,” J. Vis. Commun. Image Represent., 2016, doi: 10.1016/j.jvcir.2016.09.016.

[10] D. Lou, M. Hu, and J. Liu, “Multiple layer data hiding scheme for medical images,” Comput. Stand. Interfaces, vol. 31, pp. 329–335, 2009, doi: 10.1016/j.csi.2008.05.009.

[11] G. Gao, X. Wan, S. Yao, Z. Cui, C. Zhou, and X. Sun, “Reversible data hiding with contrast enhancement and tamper localization for medical images,” Inf. Sci. (Ny)., vol. 386, pp. 250–265, 2017, doi: 10.1016/j.ins.2017.01.009.

[12] T. Lu, C. Tseng, and J. Wu, “Dual imaging-based reversible hiding technique using LSB matching,” Signal Processing, vol. 108, pp. 77–89, 2015, doi: 10.1016/j.sigpro.2014.08.022.

[13] M. Tayel, A. Gamal, and H. Shawky, “A Proposed Implementation Method of an Audio Steganography Technique,” 2016 18th Int. Conf. Adv. Commun. Technol., no. 3, pp. 180–184, 2016, doi: 10.1109/ICACT.2016.7423320.s

[14] J. M. Blackledge and A. I. Al-Rawi, “Steganography Using Stochastic Diffusion for the Covert Communication of Digital Images,” IAENG Int. J. Appl. Math., vol. 41, pp. 270–298, 2011, available at: Google Scholar.

[15] H. S. E. S. F. El-zoghdy and O. S. Faragallah, “Adaptive Difference Expansion-Based Reversible Data Hiding Scheme for Digital Images,” Arab. J. Sci. Eng., vol. 41, pp. 1091–1107, 2016, doi: 10.1007/s13369-015-1956-7.

[16] M. S. Subhedar and V. H. Mankar, “Current status and key issues in image steganography: A survey,” Comput. Sci. Rev., pp. 1–19, 2014, doi: 10.1016/j.cosrev.2014.09.001.

[17] E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm,” Proc. Int. MultiConference Eng. Comput. Sci., vol. I, 2011, doi: 10.1007/978-1-4614-1695-1_30.

[18] R. Tanwar and M. Bisla, “Audio Steganography,” 2014 Int. Conf. Optim. Reliab. Inf. Technol., pp. 322–325, 2014, doi: 10.1109/ICROIT.2014.6798347.

[19] D. C. Kar and C. J. Mulkey, “A multi-threshold based audio steganography scheme,” J. Inf. Secure. Appl., vol. 23, pp. 54–67, 2015, doi: 10.1016/j.jisa.2015.02.001.

[20] M. B. Andra, T. Ahmad, and T. Usagawa, “Medical Record Protection with Improved GRDE Data Hiding Method on Audio Files,” Eng. Lett., vol. 25, pp. 112–124, 2017, available at: Google Scholar.

[21] J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003, doi: 10.1109/TCSVT.2003.815962.

[22] A. M. Alattar, “Reversible watermark using difference expansion of quads,” IEEE Trans. Image Process., vol. 13, no. 1, pp. 377–380, 2004, doi: 10.1109/TIP.2004.828418.

[23] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147–1156, 2004, doi: 10.1109/TIP.2004.828418.

[24] D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, 2007, doi: 10.1109/TIP.2006.891046.

[25] C. L. Liu, D. C. Lou, and C. C. Lee, “Reversible data embedding using reduced difference expansion,” in Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007., 2007, vol. 1, pp. 433–436, doi: 10.1109/IIH-MSP.2007.267.

[26] H. Yi, S. Wei, and H. Jianjun, “Improved reduced difference expansion based reversible data hiding scheme for digital images,” in ICEMI 2009 - Proceedings of 9th International Conference on Electronic Measurement and Instruments, 2009, pp. 4315–4318, doi: 10.1109/ICEMI.2009.5274054.

[27] T. Ahmad, M. Holil, W. Wibisono, and I. Royyana Muslim, “An improved Quad and RDE-based medical data hiding method,” in Proceeding - IEEE CYBERNETICSCOM 2013: IEEE International Conference on Computational Intelligence and Cybernetics, 2013, pp. 141–145, doi: 10.1109/CyberneticsCom.2013.6865798.

[28] Y. Kurniawan, L. A. Rahmania, T. Ahmad, W. Wibisono, and R. M. Ijtihadie, “Hiding secret data by using modulo function in quad difference expansion,” in 2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016, 2017, pp. 433–438, doi: 10.1109/ICACSIS.2016.7872741.

[29] M. H. A. Al Huti, T. Ahmad, and S. Djanali, “Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images,” in Proceedings of 2015 International Conference on Information and Communication Technology and Systems, ICTS 2015, 2016, pp. 225–230, doi: 10.1109/ICTS.2015.7379903.

[30] J. Y. Hsiao, K. F. Chan, and J. Morris Chang, “Block-based reversible data embedding,” Signal Processing, vol. 89, no. 4, pp. 556–569, 2009, doi: 10.1016/j.sigpro.2008.10.018.

[31] T. D. Kieu and C. C. Chang, “A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy,” J. Syst. Softw., vol. 82, no. 10, pp. 1743–1752, 2009, doi: 10.1016/j.jss.2009.05.028.

[32] eMicrobes Digital Library, “Partners Infectious Disease Images”, Accessed 30 March 2019, available at: http://www.idimages.org/images/browse/ImageTechnique/.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

___________________________________________________________
International Journal of Advances in Intelligent Informatics
ISSN 2442-6571  (print) | 2548-3161 (online)
Organized by Informatics Department - Universitas Ahmad Dahlan , and UTM Big Data Centre - Universiti Teknologi Malaysia
Published by Universitas Ahmad Dahlan
W : http://ijain.org
E : info@ijain.org, andri.pranolo@tif.uad.ac.id (paper handling issues)
     ijain@uad.ac.id, andri.pranolo.id@ieee.org (publication issues)

View IJAIN Stats

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0