Skip to main content
Log in

Reversible data hiding using optimization, interpolation and binary image encryption techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Data security is very essential since the communication takes place in the open network. In order to protect the data techniques such as image encryption and data hiding have become very popular. In this paper, a Reversible Data Hiding (RDH) based on combination of optimization algorithm, image interpolation and encryption techniques is proposed to achieve high quality of stego-images and security. Initially, the input cover image is taken and divided into 2 × 2 blocks and edges in the images are identified using edge detection techniques. Next, optimization algorithm is developed to find optimal pixels which improve the performance. Then, the interpolation process is applied to up-scale the image based on optimal pixel. Data is hidden in the interpolated pixels using dual capacity predictions method and finally image is encrypted based on edge, non-edge and interpolated pixels is sent to the receiver. Experimental results demonstrate that the proposed scheme outperforms the state-of-the-arts in terms of image quality performance, embedding capacity and Universal Image Quality Index (UIQI). Furthermore, the proposed solution is resistant to security analysis based on Structural Similarity Index Measure (SSIM) and Regular Singular (RS) analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abdel-Aziz MM, Hosny KM, Lashin NA (2021) Improved data hiding method for securing color images. Multimed Tools Appl 80(8):12641–12670

    Article  Google Scholar 

  2. Banharnsakun A (2018) Artificial bee colony approach for enhancing LSB based image steganography. Multimed Tools Appl 77:27491–27504. https://doi.org/10.1007/s11042-018-5933-5

    Article  Google Scholar 

  3. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. In Sci 324:197–207

    MathSciNet  MATH  Google Scholar 

  4. Bao P, Zhang L, Xiaolin W (2005) Canny edge detection enhancement by scale multiplication. IEEE Trans Pattern Anal Mach Intell 27(9):1485–1490

    Article  Google Scholar 

  5. Chandler DM, Hemami S (2007) SVSNR: a wavelet-based visual signal-to-noise ratio for natural images. IEEE Trans Image Process 16:2284–2298

    Article  MathSciNet  Google Scholar 

  6. Chen YQ, Sun WJ, Li LY, Chang CC, Wang X (2020) An efficient general data hiding scheme based on image interpolation. J Inform Secur Appl 54:102584

    Google Scholar 

  7. Chhikara S, Kumar R (2021) Image steganalysis with entropy hybridized with chaotic grasshopper optimizer. Multimed Tools Appl 80:31865–31885. https://doi.org/10.1007/s11042-021-11118-1

    Article  Google Scholar 

  8. Dolendro Singh L, Manglem Singh K (2018) Visually meaningful multi-image encryption scheme. Arab J Sci Eng 43:7397–7407

    Article  Google Scholar 

  9. Gonzalez, Claudia I., et al. "An improved sobel edge detection method based on generalized type-2 fuzzy logic." Soft Comput 20.2, 773–784, 2016.

  10. Haj A, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl 78(6):7181–7205

    Article  Google Scholar 

  11. Hassan FS, Gutub A (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl 79:30087–30109

    Article  Google Scholar 

  12. Hassan FS, Gutub A (2021) Efficient image reversible data hiding technique based on interpolation optimization. Arab J Sci Eng. https://doi.org/10.1007/s13369-021-05529-3

  13. Hosny KM, Darwish MM, Fouda MM (2021) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425–47435. https://doi.org/10.1109/ACCESS.2021.3068211

    Article  Google Scholar 

  14. Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Human Comput 13:973–988. https://doi.org/10.1007/s12652-021-03675-y

    Article  Google Scholar 

  15. Hsu C-S, Tu S-F (2010) Finding optimal LSB substitution using ant colony optimization algorithm. In:proceeding of Second International Conference on Communication Software and Networks, pp. 293–297 Technologies in Agriculture Engineering (CCTAE), pp. 308–310

  16. Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447–455

    Article  Google Scholar 

  17. Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31(2):465–470

    Article  Google Scholar 

  18. Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Process 14:101–114

    Article  Google Scholar 

  19. Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712–6719

    Article  Google Scholar 

  20. Lee CF, Weng CY, Kao CY (2015) Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput 23(19):9719–9731

    Article  Google Scholar 

  21. Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447

    Article  Google Scholar 

  22. Liang LR, Looney CG (2003) Competitive fuzzy edge detection. Appl Soft Comput 3(2):123–137

    Article  Google Scholar 

  23. Lin IC, Lin YB, Wang CM (2009) Hiding data in spatial domain images with distortion tolerance. Comput Stand Interfaces 31(2):458–464

    Article  MathSciNet  Google Scholar 

  24. Malik A, et al. (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimed Tools Appl : 1–24

  25. Mandal PC, Mukherjee I, Chatterji BN (2021) High capacity reversible and secured data hiding in images using interpolation and difference expansion technique. Multimed Tools Appl 80:3623–3644

    Article  Google Scholar 

  26. Mohammad AA, Al Haj A, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl 78(6):7181–7205

    Article  Google Scholar 

  27. Ponuma R, Amutha R, Aparna S, Gopal G (2019) Visually meaningful image encryption using data hiding and chaotic compressive sensing. Multimed Tools Appl 78:25707–25729

    Article  Google Scholar 

  28. Roselin Kiruba R, Sree Sharmila T (2020) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multidim Syst Sign Process 32(2):405–430

    Article  MathSciNet  MATH  Google Scholar 

  29. RoselinKiruba R, Sharmila TS (2017) Performance analysis in secured image encryption and data hiding using LSB algorithm. IEEE International Conference on Circuits and Systems (ICCS) 112-117

  30. RoselinKiruba R, Sharmila TS (2018) Hiding data in videos using optimal selection of key-frames. International Conference on Computer. Communication, and Signal Processing (ICCCSP). 1–6

  31. RoselinKiruba R, Sharmila TS (2021) A novel data hiding by image interpolation using edge quad-tree block complexity. Vis Comput 39:59–72. https://doi.org/10.1007/s00371-021-02312-1

    Article  Google Scholar 

  32. Roselinkiruba R, Sharmila TS (2021) Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm. Int J Inf Technol 13:1797–1803. https://doi.org/10.1007/s41870-021-00774-z

    Article  Google Scholar 

  33. Shaik A, Thanikaiselvan V (2019) High capacity reversible data hiding using 2D parabolic interpolation. Multimed Tools Appl 78(8):9717–9735

    Article  Google Scholar 

  34. Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683

    Article  MATH  Google Scholar 

  35. Yin Z, Xiang Y, Zhang X (2020) Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. in IEEE Trans Multimed 22(4):874–884

    Article  Google Scholar 

  36. Yong-qing C, Sun W-J, Li L-Y, Chang C-C, Wang X (2020) Wang An efficient general data hiding scheme based on image interpolation. J Inform Secur Appl 54, 102584

  37. Yuefen C, Junhuan L, Caiming C, Shingqing Z (2010) Image hiding based on intensity quantization using genetic algorithm. In, Proceedings of International Conference On Computer and Communication

    Google Scholar 

  38. Zhang X, Sun Z, Tang Z, Yu C, Wang X (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl 76(7):9195–9218

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors equally contributed in this research work. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to R. Roselinkiruba.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roselinkiruba, R. Reversible data hiding using optimization, interpolation and binary image encryption techniques. Multimed Tools Appl 82, 35757–35780 (2023). https://doi.org/10.1007/s11042-023-14651-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14651-3

Keywords

Navigation