Energy Distribution Based Dual Image Data Hiding with Weightage Mapping of Secret Data

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 11
Year of Publication : 2024
Authors : A. I. Mujeebudheen Khan, K. Siva Sankar
pdf
How to Cite?

A. I. Mujeebudheen Khan, K. Siva Sankar, "Energy Distribution Based Dual Image Data Hiding with Weightage Mapping of Secret Data," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 11, pp. 244-256, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I11P120

Abstract:

The swift advancement of information and communication technologies provides exceptional facilities in the field of data transmission systems. Nowadays, confidential information, including national security, scholastics, personal information, and industrial commerce, is exchanged through the internet and within the cloud computing environment. In the wake of technology, especially multimedia, different processes have been developed recently for information hiding and data manipulation. The secret data hiding can be performed using steganography to communicate the authentication-specific, account-specific sensitive information even in the public domain. The current method proposes an energy distribution-based dual image data hiding to solve this problem. The proposed method is designed in two distinct phases: data embedding and data extraction. Each phase is executed with careful processing steps to ensure reversible steganography and preserve the cover image and secret data. The proposed steganography technique effectively preserves the visual quality of the cover images, as demonstrated by high average PSNR values (48.2269 to 48.4770), low MSE values (0.9215 to 0.9807), and high SSIM values (0.9923 to 0.9968), indicating minimal error introduced by the embedding process. This work offers a robust approach to steganography, balancing security and image fidelity.

Keywords:

Dual image data hiding, Cover image, Energy distribution, Weightage mapping, Steganography.

References:

[1] Krishna Chaitanya Nunna, and Ramakalavathi Marapareddy, “Secure Data Transfer Through Internet Using Cryptography and Image Steganography,” SoutheastCon, Raleigh, NC, USA, pp. 1-5, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Osama F. AbdelWahab et al., “Hiding Data in Images Using Steganography Techniques with Compression Algorithms,” Telecommunication Computing Electronics and Control, vol. 17, no. 3, pp. 1168-1175, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Camille B. Smith, “The Comparison of Steganography and Cryptography: Concealing Information,” Master of Science in Cybersecurity, Utica College, pp. 1-10, 2019.
[Google Scholar]
[4] Digvijay Pandey et al., “Secret Data Transmission Using Advanced Steganography and Image Compression,” International Journal of Nonlinear Analysis and Applications, vol. 12, pp. 1243-1257, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ferda Ernawan, and Dhani Ariatmanto, “A Recent Survey on Image Watermarking Using Scaling Factor Techniques for Copyright Protection,” Multimedia Tools and Applications, vol. 82, pp. 27123-27163, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Lin Wu et al., “Deep Adaptive Feature Embedding with Local Sample Distributions for Person Re-Identification,” Pattern Recognition, vol. 73, pp. 275-288, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Bing Chen et al., “Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 978-991, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Aditya Kumar Sahu, and Gandharba Swain, “High Fidelity Based Reversible Data Hiding Using Modified LSB Matching and Pixel Difference,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 4, pp. 1395-1409, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Fatuma Saeid Hassan, and Adnan Gutub, “Novel Embedding Secrecy within Images Utilizing an Improved Interpolation-Based Reversible Data Hiding Scheme,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 5, pp. 2017-2030, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Solihah Gull, Shabir A. Parah, and Khan Muhammad, “Reversible Data Hiding Exploiting Huffman Encoding with Dual Images for IoMT Based Healthcare,” Computer Communications, vol. 163, pp. 134-149, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Yaomin Wang, Zhanchuan Cai, and Wenguang He, “High Capacity Reversible Data Hiding in Encrypted Image Based on Intra-Block Lossless Compression,” IEEE Transactions on Multimedia, vol. 23, pp. 1466-1473, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Zhaoxia Yin et al., “Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Multi-MSB Planes Rearrangement,” Signal Processing, vol. 187, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Prasanth Vaidya Sanivarapu et al., “Patient Data Hiding into ECG Signal Using Watermarking in Transform Domain,” Physical and Engineering Sciences in Medicine, vol. 43, pp. 213-226, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Tzu-Chuen Lu, Ting-Chi Chang, and Jau-Ji Shen, “An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme,” IEEE Access, vol. 8, pp. 90824-90837, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Yaomin Wang, and Wenguang He, “High Capacity Reversible Data Hiding in Encrypted Image Based on Adaptive MSB Prediction,” IEEE Transactions on Multimedia, vol. 24, pp. 1288-1298, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Jie Hu, and Tianrui Li, “Reversible Steganography Using Extended Image Interpolation Technique,” Computers & Electrical Engineering, vol. 46, pp. 447-455, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Shaswata Saha et al., “Extended Exploiting Modification Direction Based Steganography Using Hashed-Weightage Array,” Multimedia Tools and Applications, vol. 79, pp. 20973-20993, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] R. Srikanth, and K. Bikshalu, “Multilevel Thresholding Image Segmentation Based on Energy Curve with Harmony Search Algorithm,” Ain Shams Engineering Journal, vol. 12 no. 1, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]