Skip to main content

High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube

  • Conference paper
  • First Online:
New Trends in Computer Technologies and Applications (ICS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1723))

Included in the following conference series:

  • 665 Accesses

Abstract

Information technology and the Internet have progressed rapidly in people’s lives, the privacy of information has become an important issue due to the accessibility of data. Therefore, to enhance information security and privacy protection, this paper proposes a new high-capacity method for data hiding. The proposed method is based on 3D magic cube with double layers embedding. In the field of data hiding, the reference matrix-based methods attract many researchers because of its high-capacity. Recently, as the needs of the high payloads of the stego-image, the multi-layers-based technique is applied to provide larger embedding capacity. However, the image after data embedding will cause serious distortions, especially on multi-layers embedding, hence, keeping the image at a good visual quality and achieving high-payloads are the main challenges for data hiding. In this scheme, we take advantage of 3D magic cube and 3D reference space with double layers embedding for our data hiding technique to improve the embedding payloads. The experimental results show that our method not only provides good embedding capacity (4.00 bpp) but also keeps the image at acceptable quality (In terms of PSNR > 30).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)

    Article  Google Scholar 

  2. Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  3. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  4. Lee, C.-F., Wang, Y.-R., Chang, C.-C.: A steganographic method with high embedding capacity by improving exploiting modification direction. In: Proceedings of 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 497–500 (2007)

    Google Scholar 

  5. Kuo, W.-C., Wuu, L.-C., Shyi, C.-N., Kuo, S.-H.: A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method. In: Proceedings pf 9th International Conference on Hybrid Intelligent Systems, Shenyang, China, pp. 69–73 (2009)

    Google Scholar 

  6. Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 1613–1626 (2003)

    Article  MATH  Google Scholar 

  7. Tseng, H.-W., Leng, H.-S.: A steganographic method based on pixel- value differencing and the perfect square number. J. Appl. Math. 2013, 1–8 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  8. Mandal, J.K.: Colour image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Techn. 2(4), 83–93 (2012)

    Google Scholar 

  9. Chang, C.-C., Chou, Y.-C., Kieu, T.-D.: An information hiding schemeusing Sudoku. In: Proceedings of 3rd International Conference on Innovative Computing Information and Control, p. 17 (2008)

    Google Scholar 

  10. Chang, C.-C., Liu, Y., Nguyen, T.S.: A novel turtle shell-based schemefor data hiding. In: Proceedings of 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 89–93 (2014)

    Google Scholar 

  11. Lee, C.-F., Wang, Y.-X.: An image hiding scheme based on magic signet. J. Electron. Sci. Technol. 18(1), 93–101 (2020)

    Google Scholar 

  12. Lee, C.-F., Shen, J.-J., Agrawal, S., Wang, Y.-X., Lee, Y.-H.: Data hiding method based on 3D magic cube. IEEE Access 8, 39445–39453 (2020)

    Article  Google Scholar 

Download references

Acknowledgment

This work was partially supported by the National Science and Technology Council of the Republic of China under the Grant No. 110-2218-E-218-001, 111-2221-E-115-038, 111-2221-E-008-061.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Ta Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Weng, HY., Tsai, MY., Wang, WJ., Huang, CT. (2022). High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube. In: Hsieh, SY., Hung, LJ., Klasing, R., Lee, CW., Peng, SL. (eds) New Trends in Computer Technologies and Applications. ICS 2022. Communications in Computer and Information Science, vol 1723. Springer, Singapore. https://doi.org/10.1007/978-981-19-9582-8_59

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9582-8_59

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9581-1

  • Online ISBN: 978-981-19-9582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics