Skip to main content
Log in

Improved data hiding method for securing color images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, data hiding techniques have become very popular in several vital applications, especially in telemedicine. The reason for this is their ability to give good results such as high embedding capacity while preserving visual image quality as much as possible after extracting the hidden secret message. In earlier studies, many researchers have achieved the goal of reversible data hiding (RDH) algorithm. All these methods have achieved excellent results on standard and natural images. However, in the case of medical images, especially color medical images, we face the problem of how to preserve the visual quality of image contents while achieving the goals of RDH in avoiding the loss of patient data or the distortion of the diagnosing image. In this paper, we proposed a secure data hiding method using a hyper chaotic map and left-most embedding strategy. The proposed methods are hybrid, where it is applied in the DCT frequency domain and encrypted domain together as presented here. This gives a higher embedding rate and higher visual image quality than existing methods without any loss or distortion of both hidden secrets data and reconstructed image. The novelty of this paper is to embed the desired secret data in each quantized block of DCT using (8-bit LMSB) strategy for embedding process. We tested our algorithm on both color medical images and standard color images of different sizes and different formats. We evaluated the performance of our algorithm on the basis of the quality metrics MSE, PSNR, BER, SSIM, Correlation, Symbol Error Rate, additional quality evaluation metrics, execution time, and different types of geometric and signal attacks. All of these parameters are demonstrated and represented in this proposed work in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Processing 93:2986–3000 Published by Elsevier BV

    Article  Google Scholar 

  2. Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA (2020) A robust quasi-quantumwalks-based steganography protocol for secure transmission of images on cloud-based e-healthcare platforms. Sensors 20:3108. https://doi.org/10.3390/s20113108

    Article  Google Scholar 

  3. Abdel-Wahab OF, Hussein AI, Hamed HFA, Kelash HM, Khalaf AAM, Ali HM (June 2019) Hiding data in images using steganography techniques with compression algorithms. Telkomnika 17(3):1168–1175. https://doi.org/10.12928/TELKOMNIKA.v17i3.12230

    Article  Google Scholar 

  4. Alan Anwer Abdulla (October 2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, School of Science in the University of Buckingham

  5. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition, mobile multimedia/image processing, security, and applications. Proc of SPIE 9120:912005 · © 2014 SPIE. https://doi.org/10.1117/12.2050518

    Article  Google Scholar 

  6. Alan Anwer Abdulla, Harin Sellahewa and Sabah A. Jassim (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images, Springer Science and Business Media, LLC, part of Springer Nature, Multimedia Tools and Applications , https://doi.org/10.1007/s11042-019-7166-7

  7. Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R SVD-based robust Image Steganographic scheme using RIWT and DCT for the secure transmission of medical images, S0263. Measure 6413 2241(19):30186–30181. https://doi.org/10.1016/j.measurement.2019.02.069

  8. Awad Attaboy A, Mursi Ahmed M, Alsammak AK (December 2018) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal 9(4):1965–1974. https://doi.org/10.1016/j.asej.2017.02.003

    Article  Google Scholar 

  9. Batra N, Kaushik P (October 2012) Data hiding in color images using modified quantization table. International Journal of Advanced Research in Computer Science and Software Engineering 1(8)

  10. Brain atlas available at: https://www.osirix-viewer.com

  11. Color anatomical images available at: https://www.nlm.nih.gov

  12. Dicom images available at: https://www.aycan.de/sample-dicom-images.html

  13. Hassan Elkamchouchi, Wessam M. Salama and Yasmine Abouelseoud (2017) Data hiding in a digital cover image using chaotic maps and LSB technique. https://doi.org/10.1109/ICCES.2017.8275302.

  14. Nur Imtiazul Haque, Kazi Md. Rokibul Alam, Tasfia Mashiat, and Yasuhiko Morimoto (2018) A technique to enrich the secrecy level of high capacity data hiding steganography technique in JPEG compressed image

  15. Kadhim I, Premaratne P, Vial PJ, Halloran B (2018) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neuro computing, [m5G; November 16 3:21. https://doi.org/10.1016/j.neucom.2018.06.075

    Article  Google Scholar 

  16. Ke G, Wang H, Zhou S, Zhang H (March 2019) Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement 135:385–391. https://doi.org/10.1016/j.measurement.2018.11.074

    Article  Google Scholar 

  17. Khalili M (December 2015) DCT-Arnold chaotic based watermarking using JPEG-YCbCr. Optik 126(23):4367–4371. https://doi.org/10.1016/j.ijleo.2015.08.042

    Article  Google Scholar 

  18. Khosravi MR, Yazdi M (2018) A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights. Springer Neural Computing and Applications. https://doi.org/10.1007/s00521-018-3489-y(0123456789

  19. Kordov K, Stoyanov B (2017) Least significant bit steganography using Hitzl-Zele chaotic map. International of electronics and telecommunications 63(4):417–422. https://doi.org/10.1515/eletel-2017-0061

    Article  Google Scholar 

  20. Yih-Kai Lin (2014) A data hiding scheme based upon DCT coefficient modification Computer Standards & Interfaces 36: 855–862 Volume 36, Issue 5, September 2014, Pages 855–862, https://doi.org/10.1016/j.csi.2013.12.013

  21. Lin Y-K (2014) A data hiding scheme based upon DCT coefficient modification. Computer Standards & Interfaces 36:855–862. https://doi.org/10.1016/j.csi.2013.12.013

    Article  Google Scholar 

  22. Medical melanoma images (2020) available at: https://www.isicarchive.com/#!/topWithHeader/onlyHeaderTop/gallery

  23. Murat karAbatak and Yildiray Yigit (2018) Developing the LSB method using mask in colored images.

  24. Puteaux U, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2018.2799381

  25. Rhouma Rhouma and Safya Belghith (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos.

  26. Saeed MJ (2013) A new technique based on chaotic steganography encryption text in DCT domain for a color image. Journal of Engineering Science and Technology 8(5):508–520

    MathSciNet  Google Scholar 

  27. Shiffa Saleem, Dominic Mathew, Thomas A (2017) Secure reversible data hiding in color images using LWT and hyper-chaotic encryption; In: International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT 2017)

  28. Sharma VK, Mathur P, Srivastava DK (2019) Highly secure DWT steganography scheme for encrypted data hiding. In: Satapathy S, Joshi A (eds) Information and communication Technology for Intelligent Systems, smart innovation, systems and technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-13-1742-2_66

    Chapter  Google Scholar 

  29. Parah SA, Ahad F, Sheikh JA, Bhat GM (February 2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. Journal of Biomedical Informatics 66:214–230. https://doi.org/10.1016/j.jbi.2017.01.006

    Article  Google Scholar 

  30. Standard dataset images available at http://decsai.ugr.es/cvg/dbimagenes/c512.php

  31. Tang Z, Lua Q, Lao H, Yua C, Zhanga X (March 2018) Error-free reversible data hiding with high capacity in the encrypted image. Optik 157:750–760. https://doi.org/10.1016/j.ijleo.2017.11.154

    Article  Google Scholar 

  32. Thabit R, EeKhoo B (March 2015) A new robust, lossless data hiding scheme and its application to color medical images. Digital Signal Processing 38:77–94. https://doi.org/10.1016/j.dsp.2014.12.005

    Article  Google Scholar 

  33. Sriti Thakur, Amit Kumar Singh, Satya Prakash Ghrera, and Mohamed Elhoseny (2018) Multi-layer security of medical data through watermarking and chaotic encryption for telehealth applications, Springer Science +Business Media, LLC, part of Springer Nature, https://doi.org/10.1007/s11042-018-6263-3

  34. Türker T, Yasin S (2017) Block-based data hiding method for images. European Journal of Technic 7(2)

  35. Wang D, Chen D, Ma B, Xu L, Zhang J (2016) A high capacity spatial domain data hiding scheme for medical images. J Sign Process Syst, Springer Science +business Media New York. https://doi.org/10.1007/s11265-016-1169-7

  36. Zaghbani S, Boujnah N, Bouhlel MS (June 2017) High capacity data hiding scheme for DCT image using the YCbCr color space and chaotic map. Journal of Image and Graphics 5(1). https://doi.org/10.18178/joig.5.1.10-15

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khalid M. Hosny.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdel-Aziz, M.M., Hosny, K.M. & Lashin, N.A. Improved data hiding method for securing color images. Multimed Tools Appl 80, 12641–12670 (2021). https://doi.org/10.1007/s11042-020-10217-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10217-9

Keywords

Navigation