Skip to main content
Log in

A separable and dual data hiding algorithm based on adaptive ternary segmentation coding and ZN-shape space-filling curve

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Considering the applications of requiring high fidelity of multimedia content, and for the purpose of copyright protection, a separable and dual data hiding algorithm is proposed. In this paper, the definitions of Ternary Segmentation (TS), Hidden Pixel Pair (HPP), ZN-shape space-filling curve, and Lucas-Arnold Scrambling (LAS) are presented for the first time. By virtue of without degrading the quality of the host image, this paper combines reversible data hiding and zero data hiding to solves the contradiction between robustness and imperceptibility. Firstly, 1-level reversible data hiding is performed using TS, HPP and Huffman compression. Then, 2-level zero data hiding is adopted based on LAS, IWT (Integer Wavelet Transform), BN-SVD(Boost Normed Singular Value Decomposition) and ZN-shape space-filling curve. Finally, separable decryption and extraction is conducted. The experiment results prove that the proposed scheme achieves a better image perceptual quality with an average PSNR of about 49 dB, and stronger robustness with an average NCC of about 0.99 under various attacks. Moreover, it achieves higher security, and the average values of information entropy, correlation coefficient, NPCR and UACI are 7.9, 0.01, 99.6854% and 33.4378%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58

    Article  Google Scholar 

  2. Al-Zubaidie M, Zhang Z, Ji Z (2019) RAMHU: a new robust lightweight scheme for mutual users authentication in healthcare applications. Secur Commun Netw 2019:3263902–3263926

    Article  Google Scholar 

  3. Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  4. Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  5. Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Article  Google Scholar 

  6. Gong LH, Tian C, Zou WP, Zhou NR (2021) Robust and imperceptible watermarking scheme based on canny edge detection and svd in the contourlet domain. Multimed Tools Appl 80(1):439–461

    Article  Google Scholar 

  7. Heba A-N, Ali AH (2021) Reversible data hiding in adjacent zeros. Multimed Syst 27:229–245

    Article  Google Scholar 

  8. Hu K, Wang XC, Hu JP, Wang H, Qin H (2021) A novel robust zero-watermarking algorithm for medical images. Vis Comput 37:2841–2853

    Article  Google Scholar 

  9. Jiang XY, Li S (2018) Beetle antennae search without parameter tuning ( BAS-WPT ) for multi-objective optimization[EB/OL]. [2018-06-25]. Https: / /arxiv. Org /abs/1811. 02395

  10. Kaur G, Singh S, Rani R (2021) PVO based reversible data hiding technique for roughly textured images. Multidim Syst Sign Process 32:533–558

    Article  MATH  Google Scholar 

  11. Kodak lossless true color image suite [Online], (2016) Available from: http://r0k.us/graphics/kodak/

  12. Li L, Luo Y, Liu J, et al (2020) A robust watermarking scheme with high security and low computational complexity. In: International Conference on Security and Privacy in Communication Systems, 439–454

  13. Li Q, Wang XY, Ma B, Wang X, Wang C, Xia Z, Shi Y (2021) Image steganography based on style transfer and quaternion exponent moments. Appl Soft Comput 110:107618

    Article  Google Scholar 

  14. Li Q, Wang XY, Wang XY, Ma B, Wang C, Shi Y (2021) An encrypted coverless information hiding method based on generative models. Inf Sci 553:19–30

    Article  MathSciNet  MATH  Google Scholar 

  15. Li Q, Wang XY, Wang XY, Shi Y (2021) CCCIH: content-consistency coverless information hiding method based on generative models. Neural Process Lett 53(6):4037–4046

    Article  Google Scholar 

  16. Li Q, Wang XY, Wang XY et al (2022) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol 32:5695–5706. https://doi.org/10.1109/TCSVT.2021.3138795

    Article  Google Scholar 

  17. Liang XK, Tao LM, Hu B (2019) Image hybrid encryption based on a generalized chaotic mapping and matrix nonlinear transformation. J Imaging Graph 24(03):0325–0333

    Google Scholar 

  18. Liu J, Li J, Ma J, Sadiq N, Bhatti U, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Appl Sci-Basel 9:700

    Article  Google Scholar 

  19. Mansour RF, Parah SA (2021) Reversible data hiding for electronic patient information security for telemedicine applications. Arab J Sci Eng 46:9129–9144

    Article  Google Scholar 

  20. Nguyen TD, Le HD (2021) A reversible data hiding scheme based on (5, 3) hamming code using extra information on overlapped pixel blocks of grayscale images. Multimed Tools Appl 80:13099–13120

    Article  Google Scholar 

  21. Pal P, Jana B, Bhaumik J (2021) A secure reversible color image watermarking scheme based on LBP, Lagrange interpolation polynomial and weighted matrix. Multimed Tools Appl 80:21651–21678

    Article  Google Scholar 

  22. Priya C, Ramya C (2021) Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circuits Syst Signal Process 40:2464–2493

    Article  Google Scholar 

  23. Shao ZH, Shang YY, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Signal Process 120:522–531

    Article  Google Scholar 

  24. UCID-uncompressed colour image database [Online], (2016) Available from: http://homepages.lboro.ac.uk/∼cogs/datasets/UCID/ucid.html

  25. USC-SIPI image database [Online], (2016) Available from: http://sipi.usc.edu/database/

  26. Wang XY, Liu PB (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst 69(3):1291–1301

    Article  Google Scholar 

  27. Wang XY, Zhang MZ (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149

    Article  MathSciNet  Google Scholar 

  28. Wang JL, Sun X, Feng XQ (2018) Adaptive reversible image data hiding using pixel permutation. J Image Graph 23(1):1–8

    Google Scholar 

  29. Wang CP, Wang XY, Xia ZQ, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120

    Article  Google Scholar 

  30. Wang CP, Wang XY, Xia ZQ, Ma B, Shi YQ (2020) Image description with polar harmonic fourier moments. IEEE Trans Circuits Syst Video Technol 30(12):4440–4452

    Article  Google Scholar 

  31. Wang XY, Liu C, Jiang DH (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    Article  MathSciNet  Google Scholar 

  32. Wang XY, Wang XY, Ma B, Li Q, Shi YQ (2021) High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett 28:1125–1129

    Article  Google Scholar 

  33. Wu Y, Noonan JP, Agaian S (2021) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Sel Areas Telecommun 1(2):31–38

    Google Scholar 

  34. Xia ZQ, Wang XY, Wang CP, Wang C, Ma B, Li Q, Wang M, Zhao T (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52:607–621

    Article  Google Scholar 

  35. Xian YJ, Wang XY, Teng L (2022) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32(6):4028–4037

    Article  Google Scholar 

  36. Xiao ZJ, Jiang D, Zhang H et al (2019) Adaptive zero-watermarking algorithm based on boost normed singular value decomposition. J Image Graph 24(01):1–12

    Google Scholar 

  37. Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2021) Robust zero-watermarking scheme based on novel quaternion radial fractional Charlier moments. Multimed Tools Appl 80:21679–21708

    Article  MATH  Google Scholar 

  38. Zhang XP, Wang SZ (2005) Lossless information hiding based on pix- el-value exchange. J Optoelectron·Laser 16(8):956–960

    Google Scholar 

  39. Zhou Z, Zhu J, Su Y et al (2021) Geometric correction code-based robust image watermarking. IET Image Process:1–10

  40. Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 2:717–729

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Scientific Research Program Funded by Liaoning Provincial Education Department (Grant No. WQ2020014), the Key Research Project of Dalian academy of social sciences (Grant No. 2020dlsky042, 2021dlsky027) and Liaoning Planning Office of Philosophy and Social Science (CN) (Grant L19BTQ001), the National Youth Science Foundation of China(61601214).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shi Hui.

Ethics declarations

Conflict of interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled “A separable and dual data hiding algorithm based on adaptive Ternary Segmentation Coding and ZN-shape space-filling curve”.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hui, S., Sai, M., Jian, Z. et al. A separable and dual data hiding algorithm based on adaptive ternary segmentation coding and ZN-shape space-filling curve. Multimed Tools Appl 82, 21205–21241 (2023). https://doi.org/10.1007/s11042-022-14032-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14032-2

Keywords

Navigation