Abstract
Aiming at the problem of the security of secret information in various potential applications, we introduce a robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition (SVD). Firstly, the carrier and secret mark information is transformed by NSCT-HD-SVD. Secondly, the singular score of secret media information is concealed in the carrier image. Thirdly, the text document is further concealed in the carrier marked image via pseudo magic cubes to achieve the final carrier marked image. Finally, the lossless encryption scheme is utilized to encrypt the final marked image. The simulation results of the proposed algorithm indicate good invisibility and robustness effect compared to existing schemes with high security and hiding efficiency. It indicates a considerable improvement in robustness of up to 96.36% over other schemes. Overall, the proposed algorithm for various images, achieved peak signal-to-noise ratio (PSNR), normalized correlation (NC), structural similarity index (SSIM), number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI) of up to 67.36 dB, 0.9996, 1.0000, 0.9964 and 0.4005, respectively, indicating its effectiveness for secure media applications.
Similar content being viewed by others
References
Mahato, S., Yadav, D., Khan, D.: A novel information hiding scheme based on social networking site viewers’ public comments. J. Inf. Secur. Appl. 47, 275–283 (2019)
Singh, A.K., Kumar, B., Singh, G., Mohan, A.: Digital Image Watermarking: Concepts and Applications. In: Singh, A., Kumar, B., Singh, G., Mohan, A. (eds) Medical Image Watermarking. Multimedia Systems and Applications. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57699-2_1
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A Privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Singh, A.K.: Data Hiding: Current Trends, Innovation and Potential Challenges. ACM Trans. Multimed. Comput. Commun. Appl. 16(3s), 1–16 (2021)
Singh, O.P., Singh, A. K., Srivastava, G., Kumar, N.: Image watermarking using soft computing techniques: A comprehensive survey. Multimed. Tools Appl., pp. 1–32, 2020.
Mohanty, S., Sengupta, A., Guturu, P., Kougianos, E.: Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum. Electr. Mag. 6(3), 83–91 (2017)
Yuan, Z., Su, Q., Liu, D., Zhang, X.: A blind image watermarking scheme combining spatial domain and frequency domain. Vis. Comput. 37, 1867–1881 (2021)
Nam, S., Mun, S., Ahn, W., Kim, D., In, Yu., Kim, W., Lee, H.: NSCT-based robust and perceptual watermarking for DIBR 3D images. IEEE Access 8, 93760–93781 (2020)
Liu, J., Huang, J., Luo, Y., Cao, L., Yang, S., Wei, D., Zhou, R.: An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7, 80849–80860 (2019)
Ranjani, J., Zaid, F.: Pseudo magic cubes: a multidimensional data hiding scheme exploiting modification directions for large payloads. Comput. Electr. Eng. 89, 1–10 (2021)
Zefreh, E.: An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 79(33–34), 24993–25022 (2020)
M. Kazemi, M. Pourmina and A. Mazinan, "Novel Neural Network Based CT-NSCT Watermarking Framework Based upon Kurtosis Coefficients", Sensing and Imaging, vol. 21, no. 1, 2019.
Thakur, S., Singh, A., Ghrera, S., Mohan, A.: Chaotic based secure watermarking approach for medical images. Multimed. Tools Appl. 79(7–8), 4263–4276 (2018)
A. Amiri and S. Mirzakuchaki, "A digital watermarking method based on NSCT transform and hybrid evolutionary algorithms with neural networks", SN Applied Sciences, vol. 2, no. 10, 2020.
Li, J., Zhang, C.: Blind watermarking scheme based on Schur decomposition and non-subsampled contourlet transform. Multimed. Tools Appl. 79(39–40), 30007–30021 (2020)
Su, Q., Wang, G., Lv, G., Zhang, X., Deng, G., Chen, B.: A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. Multimed. Tools Appl. 76(6), 8781–8801 (2016)
Singh, A.K., Thakur, S., Jolfaei, A., Srivastava, G., Elhoseny, M., Mohan, A.: Joint encryption and compression-based watermarking technique for security of digital documents. ACM Trans. Internet Technol. 21(1), 1–20 (2021)
Kumar, C., Singh, A.K., Kumar, P., Singh, R., Singh, S.: SPIHT - based multiple image watermarking in NSCT domain. Concurrency and Computation: Practice and Experience 32(1) (2018)
Nam, S., Mun, S., Kim, D., Ahn, W., Yu, I., Kim, W., Lee, H., et al.: NSCT-based robust and perceptual watermarking for DIBR 3D images. IEEE Access 8, 93760–93781 (2020)
P. S. and C. P. V. S. S. R., "A robust semi-blind watermarking for color images based on multiple decompositions", Multimedia Tools and Applications, vol. 76, no. 24, pp. 25623–25656, 2017.
Luo, Y., Li, L., Liu, J., Tang, S., Zhang, S., Qiu, S., Cao, Y.: A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Systems with Applications 168, 114272 (2021)
Anand, A., Singh, A. K.: An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 152, 72–80 (2020)
Anand, A., Singh, A.K., Lv, Z., Bhatnagar, G.: Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE Multimed. 27(4), 133–143 (2020)
Thakur, S., Singh, A. K., Kumar, B., Ghrera, S.P.: Improved DWTSVD-Based Medical Image Watermarking Through Hamming Code and Chaotic Encryption. Lecture Notes in Electrical Engineering, pp. 897–905 (2019)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, O.P., Singh, A.K. A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Machine Vision and Applications 32, 101 (2021). https://doi.org/10.1007/s00138-021-01227-0
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00138-021-01227-0