Skip to main content
Log in

Extended squared magic matrix for embedding secret information with large payload

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Data hiding is a technology designed for safely transmitting secret data through open communication channels, in which the secret data are embedded into a cover carrier imperceptibly. Among the existing data hiding schemes, the exploiting-modification-direction (EMD) based schemes draw considerable attentions due to large embedding capacity. The proposed scheme improves the EMD-2 scheme by constructing an extended squared magic matrix, resulting in a larger embedding capacity high up to 3.15 bits per pixel (bpp). Experimental results show that the proposed scheme outperforms state-of-the-art reference matrix based schemes in terms of embedding capacity, meanwhile, maintains good image quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336

    Article  Google Scholar 

  2. Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786

    Article  Google Scholar 

  3. Chang C C, Chou Y C, Kieu T D (2008) An information hiding scheme using Sudoku. In Proceedings of the Third International Conference on Innovative Computing, Information and Control (Dalian, China, June 18–20, 2008):17–22

  4. Chang CC, Kieu TD, Wu WC (2009) A loss-less data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597–1603

    Article  MATH  Google Scholar 

  5. Chang C C, Liu Y, Nguyen T S (2014) A novel turtle shell based scheme for data hiding. In Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (Kitakyushu, Japan, August 27–29, 2014): 89–93

  6. Davis RM (1978) The data encryption standard in perspective. IEEE Commun Soc Mag 16(6):5–9

    Article  Google Scholar 

  7. Hu YC (2006) High capacity image hiding scheme based on vector quantization. Pattern Recogn 39(9):1715–1724

    Article  MATH  Google Scholar 

  8. Huang F, Qu X, Kim HJ, Huang J (2016) Reversible data hiding in JPEG images. IEEE Trans Circuits Syst Video Technol 26(9):1610–1621

    Article  Google Scholar 

  9. Ker AD (2004) Improved detection of LSB steganography in grayscale images. Proc Inform Hiding Workshop 3200:97–115

    Article  Google Scholar 

  10. Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction schemes. Comput Math Appl 60(2):319–325

    Article  MathSciNet  MATH  Google Scholar 

  11. Liu Y, Chang CC, Nguyen TS (2016) High capacity turtle shell-based data hiding. IET Image Process 10(2):130–137

    Article  Google Scholar 

  12. Liu Y, Chang C C, Huang P C (2017) Extended exploiting-modification-direction data hiding with high capacity. 2017 International Conference on Video and Image Processing (Singapore, Dec. 27–29, 2017): 151–155

  13. Liu Y, Chang CC, Huang PC (2018) Efficient information hiding based on theory of numbers. Symmetry 10(1):19

    Article  MATH  Google Scholar 

  14. Mielikainen J (2006) LSB matching revisited. IEEE Signal Proc Lett 13(5):285–287

    Article  Google Scholar 

  15. Qin C, Chang CC, Hsu T (2015) Reversible data hiding scheme based on exploiting modification direction with two Steganographic images. Multimed Tools Appl 74(15):5861–5872

    Article  Google Scholar 

  16. Rivest R, Shamir A, Adleman L (1978) A scheme for obtaining digital signature and public key cryptosystems. Commun ACM 21(2):120–126

    Article  MATH  Google Scholar 

  17. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by Education and Scientific Research Project of Fujian Province under Grant JT180436, Xiamen Science and Technology Planning Project under Grant 3502Z20183058 and Open Fund of Engineering Research Center for Software Testing and Evaluation of Fujian Province.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanjun Liu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xie, XZ., Liu, Y. & Chang, CC. Extended squared magic matrix for embedding secret information with large payload. Multimed Tools Appl 78, 19045–19059 (2019). https://doi.org/10.1007/s11042-019-7252-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7252-x

Keywords

Navigation