Abstract
Data hiding in images has evolved as one of the trusted methods of secure data communication and numerous approaches have been introduced over the years using gray scale images as the cover media. Most of the methods are based on data hiding in least significant bit planes of cover images. Many such methods purely depend on data substitution algorithms by defining a pattern in which data is embedded. One can gain access to the secret data in a few attempts, if the algorithm is known. Keeping this in view several approaches based on secret keys have also been proposed by researchers. This paper proposes an efficient data embedding scheme using a key and an embedding pattern generated through midpoint circle generation algorithm. The pattern can be applied to a carrier that is mapped onto a grid/image. The cryptosystem uses the concept of steganography and is computationally light and secure. The secret-key is generated in such a way that Avalanche effect is ensured except in very rare cases. The proposed data embedding method is shown to be robust and highly secure while maintaining good hiding capacity and imperceptibility. It is applicable for data hiding in a generic grid that could be of pixels or bits.














Similar content being viewed by others
References
Cao H, Kot AC (2010) Lossless data embedding in electronic inks. IEEE Trans Inf Forensics Secur 5(2):314–323
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97
Das S, Rane S, Vetro A (2010) Hiding information inside structured shapes. In: Acoustics speech and signal processing (ICASSP) IEEE, pp 1782–1785
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809
Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15–23
Gou H, Wu M (2005) Data hiding in curves with application to fingerprinting maps. IEEE Trans Signal Process 53(10):3988–4005
Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370–380
Hearn D, Baker MP, Baker MP (2004) Computer graphics with openGL(3). Pearson Prentice Hall, Upper Saddle River, NJ
Huang HC, Chang FC (2013) Hierarchy-based reversible data hiding. Expert Syst Appl 40(1):34–43
Janakiraman S, Thenmozhi K, Rajagopalan S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2014) Space filling curve for data filling: an embedded security approach. J Inf Technol 6:188–197
Johnson M, Ishwar P, Prabhakaran V, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10):2992–3006
Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130
Lee CF, Chen HL (2010) A novel data hiding scheme based on modulus function. J Syst Softw 83(5):832–843
Lee IS, Tsai WH (2009) Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recogn 42(7):1604–1611
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (1):187–193
Mary SC, Pallikondarajasekaran M, Chrisbinjeeva Y (2013) A novel approach for information security in ad hoc networks through secure key management. J Comput Sci 9(11):1556–1565
Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 1–12
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Ohbuchi R, Masuda H, Aono M (1999) A shape-preserving data embedding algorithm for NURBS curves and surfaces. In: Cgi IEEE, p 180
Ou B, Li X, Zhao Y, Ni R (2013) Reversible data hiding based on PDE predictor. J Syst Softw 86(10):2700–2709
Revenkar PS, Anjum A, Gandhare WZ (2010) Survey of visual cryptography schemes. International Journal of Security and Its Applications 4(2):49–56
Shannon CE (1948) A mathematical theory of communication. J Bell System Technical 27:623–656
Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press, Boca Raton
Shyu SJ, Jiang HW (2013) General constructions for threshold multiple-secret visual cryptographic schemes. IEEE Trans Inf Forensics Secur 8(5):733–743
Stallings W (2006) Cryptography and network security: principles and practices. Pearson Education, India
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569–577
Wang CC, Kuo WC, Huang YC, Wuu LC (2017) A high capacity data hiding scheme based on re-adjusted GEMD. Multimedia Tools and Applications 1–15. https://doi.org/10.1007/s11042-017-4541-0
Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995
Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. Journal of Information Security and Applications 26:1–7
Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573–576
Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans Circuits Syst Video Technol 24(12):2077–2089
Yan C, Zhang Y, Dai F, Wang X, Li L, Dai Q (2014) Parallel deblocking filter for HEVC on many-core processor. Electron Lett 50(5):367–368
Yan C, Zhang Y, Dai F, Zhang J, Li L, Dai Q (2014) Efficient parallel HEVC intra-prediction on many-core processor. Electron Lett 50(11):805–806
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Zhang X (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inf Forensics Secur 6(1):53–58
Zhao Z, Luo H (2012) Reversible data hiding based on Hilbert curve scan and histogram modification. Inf Technol J 11(2):209
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yadav, G.S., Ojha, A. Secure data hiding scheme using shape generation algorithm: a key based approach. Multimed Tools Appl 77, 16319–16345 (2018). https://doi.org/10.1007/s11042-017-5200-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5200-1