Skip to main content
Log in

A novel QIM data hiding scheme and its hardware implementation using FPGA for quality access control of digital image

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a data-hiding scheme for quality access control of digital images using quantization index modulation (QIM) and its hardware implementation. To achieve the goal, an encoded binary message is embedded over N-mutually orthogonal signal points using the QIM technique but without complete self-noise suppression. It is well known that due to the insertion of external information, there will be degradation in the visual quality of the host image. This feature may be used in access control through the reversible process. At the decoder side, watermark bits are extracted using minimum distance decoding. Self-noise is then suppressed by the authorized user to provide a better quality of the image. Moreover, for real-time implementation, field-programmable-gate-array (FPGA) based hardware architecture is also proposed. The scheme is tested over a large number of benchmark images, and the experimental results are compared with the related scheme and found to be superior. It is also seen that (a) in real-time processing, the scheme saves 87.86% power than the related implementation found in the literature, (b) a very high throughput of 119.54 Megabyte/s and 119.048 Mbps are achieved for encoder and pipelined decoder at the maximum operating frequency of 120.013 MHz and 120.01 MHz, respectively for the processing of (512 × 512) sized images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Belhadj H, Aggarwal V, Pradhan A, Zerrouki A (2009) Power-aware FPGA design. Actel corporation white paper 75.

  2. Braci S, Delpha C, Boyer R (2011) How quantization based schemes can be used in image steganographic context. Signal Process Image Commun 26:567–576. https://doi.org/10.1016/j.image.2011.07.006

    Article  Google Scholar 

  3. Buch KD (2018) Low power architecture and HDL coding practices for on-board hardware applications. https://nepp.nasa.gov/mapld_2009/talks/.../Buch_Kaushal%20D._mapld09_pres_2.ppt. Accessed 09 March 2018

  4. Cachin C (1998) An information-theoretic model for steganography. In Proc of the International Workshop on Information Hiding 1525:306–318. https://doi.org/10.1007/3-540-49380-8_21

    Article  Google Scholar 

  5. Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. The Imaging Science Journal 58:177–185. https://doi.org/10.1179/136821910X12651933390629

    Article  Google Scholar 

  6. Coşkun İ, Akar F, Çetìn Ö (2013) A new digital image steganography algorithm based on visible wavelength. Turk J Electr Eng Comput Sci 21:548–564. https://doi.org/10.3906/elk-1108-74

    Article  Google Scholar 

  7. Darji AD, Lad TC, Merchant SN, Chandorkar AN (2013) Watermarking hardware based on wavelet coefficients quantization method. Circuits, Systems, and Signal Processing 32:2559–2579. https://doi.org/10.1007/s00034-013-9550-2

    Article  MathSciNet  Google Scholar 

  8. Das S, Maity R, Maity NP (2018) VLSI-based pipeline architecture for reversible image watermarking by difference expansion with high-level synthesis approach. Circuits, Systems, and Signal Processing 37:1575–1593. https://doi.org/10.1007/s00034-018-0979-1

    Article  MathSciNet  Google Scholar 

  9. Dixit A, Dixit R (2017) A review on digital image watermarking techniques. International Journal of Image, Graphics & Signal Processing 9:56–66. https://doi.org/10.5815/ijigsp.2017.04.07

    Article  Google Scholar 

  10. Dogan S (2017) A reversible data hiding scheme based on graph neighbourhood degree. Journal of Experimental & Theoretical Artificial Intelligence 29:741–753. https://doi.org/10.1080/0952813X.2016.1259264

    Article  Google Scholar 

  11. Ghadi M, Laouamer L, Nana L, Pascu A (2018) A blind spatial domain-based image watermarking using texture analysis and association rules mining. Multimed Tools Appl:1–46. https://doi.org/10.1007/s11042-018-6851-2

  12. Hazra S, Ghosh S, De S, Rahaman H (2018) FPGA implementation of semi-fragile reversible watermarking by histogram bin shifting in real time. J Real-Time Image Proc 14:193–221. https://doi.org/10.1007/s11554-017-0672-9

    Article  Google Scholar 

  13. Image Database: http://www.io.csic.es/PagsPers/JPortilla/image-processing/bls-gsm/63-test-images. Accessed 02 July 2017.

  14. Kim C, Shin D, Leng L, Yang C-N (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101–114. https://doi.org/10.1007/s11554-016-0641-8

    Article  Google Scholar 

  15. Lin SL, Huang CF, Liou MH, Chen CY (2013) Improving histogram-based reversible information hiding by an optimal weight-based prediction scheme. Journal of Information Hiding and Multimedia Signal Processing 4:19–33

    Article  Google Scholar 

  16. Lo CC, Hu YC, Chen WL, Wu CM (2014) Reversible data hiding scheme for BTC-compressed images based on histogram shifting. International Journal of Security and Its Applications 8:301–314. https://doi.org/10.14257/ijsia.2014.8.2.31

    Article  Google Scholar 

  17. Maity SP, Kundu MK (2013) Distortion free image-in-image communication with implementation in FPGA. AEU-International Journal of Electronics and Communication 67:438–447. https://doi.org/10.1016/j.aeue.2012.10.014

    Article  Google Scholar 

  18. Maity HK, Maity SP (2014) FPGA implementation of reversible watermarking in digital image using reversible contrast mapping. The Journal of Systems and Software 96:93–104. https://doi.org/10.1016/j.jss.2014.05.079

    Article  Google Scholar 

  19. Maity HK, Maity SP, Delpha C (2013) A modified RCM for reversible watermarking with FPGA implementation. In Proc. of 4th European workshop on visual information processing. 100–105.

  20. Mandal H, Phadikar A, Maity GK, Chiu TL (2018) FPGA based low power hardware for quality access control of compressed greyscale image. Microsyst Technol:1–14. https://doi.org/10.1007/s00542-018-3817-2

  21. Mohanty SP, Kougianos E, Ranganathan N (2007) VLSI architecture and chip for combined invisible robust and fragile watermarking. IET Comput Digit Tech 1:600–611. https://doi.org/10.1049/iet-cdt:20070057

    Article  Google Scholar 

  22. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24. https://doi.org/10.1016/j.dsp.2016.02.005

    Article  Google Scholar 

  23. Pexaras K, Tsiourakis C, Karybali IG, Kalligeros E (2017) Optimization and hardware implementation of image watermarking for low cost applications. In Proc. of the 24th IEEE international conference on electronics, circuits, and systems 347–350. https://doi.org/10.1109/ICECS.2017.8292014

  24. Phadikar A, Maity GK, Chiu TL, Mandal H (2019) FPGA implementation of lifting-based data hiding scheme for efficient quality access control of images. Circuits, Systems, and Signal Processing 38:847–873. https://doi.org/10.1007/s00034-018-0893-6

    Article  Google Scholar 

  25. Phadikar A, Maity SP, Mandal MK (2008) Quantization based data hiding scheme for quality access control of images. In Proc. of the 12th IASTED international Conference on Internet and Multimedia Systems and Applications. 113-118

  26. Phadikar A, Mandal H, Maity G, Chiu TL (2015) A new model of QIM data hiding for quality access control of digital image. IEEE International Conference on Soft-Computing and Networks Security:1–5. https://doi.org/10.1109/ICSNS.2015.7292441

  27. Souici I, Seridi H, Akdag H (2011) Images encryption by the use of evolutionary algorithms. Analog Integr Circ Sig Process 69:49–58. https://doi.org/10.1007/s10470-011-9627-4

    Article  Google Scholar 

  28. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22:91–106. https://doi.org/10.1007/s00500-017-2489-7

    Article  Google Scholar 

  29. Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7:297–306. https://doi.org/10.1007/s11760-011-0238-4

    Article  Google Scholar 

  30. Terchi Y, Bouguezel S (2018) A blind audio watermarking technique based on a parametric quantization index modulation. Multimed Tools Appl 77:25681–25708. https://doi.org/10.1007/s11042-018-5813-z

    Article  Google Scholar 

  31. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13:1–14

    Article  Google Scholar 

  32. Weng S, Pan JS, Gao X (2012) Reversible watermark combining pre-processing operation and histogram shifting. Journal of Information Hiding and Multimedia Signal Processing 3:320–326

    Google Scholar 

Download references

Acknowledgments

This study was supported by the Ministry of Science and Technology (MOST), Taiwan R.O.C., under grant number MOST 107-3113-E-155-001-CC2,106-3113-E-155-001-CC2, 106-2221-E-155-036, 105-3113-E-155-001, 104-3113-E-155-001, 103-3113-E-155-001, 103-2221-E-155-028-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Phadikar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Phadikar, A., Mandal, H. & Chiu, TL. A novel QIM data hiding scheme and its hardware implementation using FPGA for quality access control of digital image. Multimed Tools Appl 79, 12507–12532 (2020). https://doi.org/10.1007/s11042-019-08392-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08392-5

Keywords

Navigation