Skip to main content
Log in

Separable dual data hiding scheme for secured data in cloud environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Robust as well as secure data hiding is capable of providing a promising solution in many copyright protection applications. In this paper, a separable dual data hiding scheme for secured data is developed. Security of carrier image is enhanced by the new proposed TSRM (Tent-Sort-Reshape-Modulation). And security of secret message is ensured by the new proposed PAS (Padova-Arnold- Scrambling). The robustness is increased by dual data hiding, one is zero data hiding, and the other is robust data hiding, in which QWT, SVD, Schur decompositin and entropy rate superpixel segmentation are used. Under different attacks, even if one secret message fails, the other one can still be used for authentication. A large number of experimental results and thorough evaluations confirm that our scheme can obtain higher security, better imperceptibility and stronger robustness under different types of attacks, and achieve better performance than the current state-of-the-art data hiding algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis, United Kingdom: Alan Abdulla and the University of Buckingham

  2. Bayat M, Abbasi M, Yosefi A (2016) Improvement of Pest detection using histogram adjustment method and Gabor wavelet. Asian J Sci Res 6(2):24–33

    Google Scholar 

  3. Bhinder P, Jindal N, Singh K (2020) An improved robust image-adaptive watermarking with two watermarks using statistical decoder. Multimed Tools Appl 79:183–217

    Article  Google Scholar 

  4. Chang TJ, Pan LH, Huang PS, Hu CH (2019) A robust DCT-2DLDA watermark for color images. Multimed Tools Appl 78:9169–9191

    Article  Google Scholar 

  5. Chen YY, Chi KY (2019) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimed Syst 25:551–563

  6. Chen S Y, Su Q T, Wang H Y, et al (2021) A high-efficiency blind watermarking algorithm for double color image using Walsh Hadamard transform. Vis Comput, 1–17

  7. Fletcher P, Sangwine SJ (2017) The development of the quaternion wavelet transform. Signal Process 136:2–15

    Article  Google Scholar 

  8. Jessica F, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882

    Article  Google Scholar 

  9. Jiang XY, Li S (2018) Beetle antennae search without parameter tun- ing ( BAS-WPT ) for multi-objective optimization[EB/OL]. [2018-06-25]. https://arxiv.Org./abs/1811.02395. Accessed June 2021

  10. Ke LF, Yin ZX (2021) On the security and robustness of “keyless dynamic optimal multi-bit image steganography using energetic pixels”. Multimed Tools Appl 80:3997–4005

    Article  Google Scholar 

  11. Kodak lossless true color image suite [Online], (2016) Available from: http://r0k.us/graphics/kodak/. Accessed June 2021

  12. Kumar PM, Hong CS, Babu GC et al (2021) Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases. Soft Comput 25(18):12159–12174

    Article  Google Scholar 

  13. Li C, Li J, Fu B (2013) Magnitude-phase of quaternion wavelet transform for texture representation using multilevel copula. IEEE Signal Process Lett 20(8):799–802

    Article  Google Scholar 

  14. Li J, Yu C, Gupta BB (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561

    Article  Google Scholar 

  15. Liu M, Tuzel O, Ramalingam S (2011) Entropy rate superpixel segmentation// in IEEE conference on computer vision and. Pattern Recogn:2097–2104

  16. Liu D, Su Q, Yuan Z, Zhang X (2021) A fusion-domain color image watermarking based on Haar transform and image correction. Expert Syst Appl 170(15):114540. https://doi.org/10.1016/j.eswa.2020.114540

    Article  Google Scholar 

  17. Moore AP, Prince SJD, Warrell J (2010) Lattice cut-constructing superpixels using layer constraints//in IEEE conference on computer vision and. Pattern Recogn:2117–2124

  18. Ndayikengurukiye A, Ez-Zahout A, Omary F (2022) A big data-driven model for secured systems: a blockchain-based architecture for cloud computing and IoT security. Adv Intell Syst Comput 1399:409–418

  19. Niu PP, Wang L, Shen X, Zhang SY, Wang XY (2020) A novel robust image watermarking in quaternion wavelet domain based on superpixel segmentation. Multidim Syst Sign Process 31:1509–1530

    Article  MATH  Google Scholar 

  20. Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):7445–7471

    Article  Google Scholar 

  21. Sable S, Adakane P (2020) Sensitive data security over network through a combination of visual cryptography and data hiding mechanism. Int J Grid Distrib Comput 13(1):220–226

  22. Seyyed HS, Amir HT, Amir HM (2019) Waca: a new blind robust watermarking method based on Arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed Tools Appl 78(14):19163–19179

    Article  Google Scholar 

  23. Shynu PG, Nadesh RK, Menon VG et al (2020) A secure data deduplication system for integrated cloud-edge networks. J Cloud Comput Adv Syst Appl 2020 9(61):1–12

    Google Scholar 

  24. Tong DY, Ren N, Zhu CQ (2019) Secure and robust watermarking algorithm for remote sensing images based on compressive sensing. Multimed Tools Appl 78:16053–16076

    Article  Google Scholar 

  25. UCID-uncompressed colour image database [Online], (2016) Available from: http://homepages.lboro.ac.uk/.cogs/datasets/UCID/ucid.html. Accessed June 2021

  26. USC-SIPI image database [Online], (2016), Available from: http://sipi.usc.edu/database/. Accessed June 2021

  27. Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507–2523

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Scientific Research Program Funded by Liaoning Provincial Education Department (Grant No. WQ2020014), the Key Research Project of Dalian academy of social sciences (Grant No. 2020dlsky042, 2021dlsky027), Liaoning Planning Office of Philosophy and Social Science (CN) (Grant L19BTQ001), the National Youth Science Foundation of China(61601214).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shi Hui.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hui, S., Meihan, C. & Kexun, Y. Separable dual data hiding scheme for secured data in cloud environment. Multimed Tools Appl 82, 19117–19154 (2023). https://doi.org/10.1007/s11042-022-14039-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14039-9

Keywords

Navigation