Abstract
Robust as well as secure data hiding is capable of providing a promising solution in many copyright protection applications. In this paper, a separable dual data hiding scheme for secured data is developed. Security of carrier image is enhanced by the new proposed TSRM (Tent-Sort-Reshape-Modulation). And security of secret message is ensured by the new proposed PAS (Padova-Arnold- Scrambling). The robustness is increased by dual data hiding, one is zero data hiding, and the other is robust data hiding, in which QWT, SVD, Schur decompositin and entropy rate superpixel segmentation are used. Under different attacks, even if one secret message fails, the other one can still be used for authentication. A large number of experimental results and thorough evaluations confirm that our scheme can obtain higher security, better imperceptibility and stronger robustness under different types of attacks, and achieve better performance than the current state-of-the-art data hiding algorithms.
















Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis, United Kingdom: Alan Abdulla and the University of Buckingham
Bayat M, Abbasi M, Yosefi A (2016) Improvement of Pest detection using histogram adjustment method and Gabor wavelet. Asian J Sci Res 6(2):24–33
Bhinder P, Jindal N, Singh K (2020) An improved robust image-adaptive watermarking with two watermarks using statistical decoder. Multimed Tools Appl 79:183–217
Chang TJ, Pan LH, Huang PS, Hu CH (2019) A robust DCT-2DLDA watermark for color images. Multimed Tools Appl 78:9169–9191
Chen YY, Chi KY (2019) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimed Syst 25:551–563
Chen S Y, Su Q T, Wang H Y, et al (2021) A high-efficiency blind watermarking algorithm for double color image using Walsh Hadamard transform. Vis Comput, 1–17
Fletcher P, Sangwine SJ (2017) The development of the quaternion wavelet transform. Signal Process 136:2–15
Jessica F, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882
Jiang XY, Li S (2018) Beetle antennae search without parameter tun- ing ( BAS-WPT ) for multi-objective optimization[EB/OL]. [2018-06-25]. https://arxiv.Org./abs/1811.02395. Accessed June 2021
Ke LF, Yin ZX (2021) On the security and robustness of “keyless dynamic optimal multi-bit image steganography using energetic pixels”. Multimed Tools Appl 80:3997–4005
Kodak lossless true color image suite [Online], (2016) Available from: http://r0k.us/graphics/kodak/. Accessed June 2021
Kumar PM, Hong CS, Babu GC et al (2021) Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases. Soft Comput 25(18):12159–12174
Li C, Li J, Fu B (2013) Magnitude-phase of quaternion wavelet transform for texture representation using multilevel copula. IEEE Signal Process Lett 20(8):799–802
Li J, Yu C, Gupta BB (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561
Liu M, Tuzel O, Ramalingam S (2011) Entropy rate superpixel segmentation// in IEEE conference on computer vision and. Pattern Recogn:2097–2104
Liu D, Su Q, Yuan Z, Zhang X (2021) A fusion-domain color image watermarking based on Haar transform and image correction. Expert Syst Appl 170(15):114540. https://doi.org/10.1016/j.eswa.2020.114540
Moore AP, Prince SJD, Warrell J (2010) Lattice cut-constructing superpixels using layer constraints//in IEEE conference on computer vision and. Pattern Recogn:2117–2124
Ndayikengurukiye A, Ez-Zahout A, Omary F (2022) A big data-driven model for secured systems: a blockchain-based architecture for cloud computing and IoT security. Adv Intell Syst Comput 1399:409–418
Niu PP, Wang L, Shen X, Zhang SY, Wang XY (2020) A novel robust image watermarking in quaternion wavelet domain based on superpixel segmentation. Multidim Syst Sign Process 31:1509–1530
Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):7445–7471
Sable S, Adakane P (2020) Sensitive data security over network through a combination of visual cryptography and data hiding mechanism. Int J Grid Distrib Comput 13(1):220–226
Seyyed HS, Amir HT, Amir HM (2019) Waca: a new blind robust watermarking method based on Arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed Tools Appl 78(14):19163–19179
Shynu PG, Nadesh RK, Menon VG et al (2020) A secure data deduplication system for integrated cloud-edge networks. J Cloud Comput Adv Syst Appl 2020 9(61):1–12
Tong DY, Ren N, Zhu CQ (2019) Secure and robust watermarking algorithm for remote sensing images based on compressive sensing. Multimed Tools Appl 78:16053–16076
UCID-uncompressed colour image database [Online], (2016) Available from: http://homepages.lboro.ac.uk/.cogs/datasets/UCID/ucid.html. Accessed June 2021
USC-SIPI image database [Online], (2016), Available from: http://sipi.usc.edu/database/. Accessed June 2021
Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507–2523
Acknowledgements
This work was supported by the Scientific Research Program Funded by Liaoning Provincial Education Department (Grant No. WQ2020014), the Key Research Project of Dalian academy of social sciences (Grant No. 2020dlsky042, 2021dlsky027), Liaoning Planning Office of Philosophy and Social Science (CN) (Grant L19BTQ001), the National Youth Science Foundation of China(61601214).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hui, S., Meihan, C. & Kexun, Y. Separable dual data hiding scheme for secured data in cloud environment. Multimed Tools Appl 82, 19117–19154 (2023). https://doi.org/10.1007/s11042-022-14039-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-14039-9