Skip to main content
Log in

An image data hiding technique using Differential Evolution

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The techniques of data hiding have turned out to be one of the prominent factors to ensure security and confidentiality of the communication network adopting untrustworthy and insecure means to transfer delicate information. This paper proposes a novel watermarking scheme that has used Differential Evolution(DE) optimization algorithm to efficiently hide data. The key factors of any watermarking scheme are imperceptibility and robustness. The present work has tried to gain the relevant degree of optimization between these two disagreeable factors by using the optimization technique of DE. The novelty of this paper lies in: (i) the proposed method applies DE on the pixel intensities of host image to locate the cognitively insignificant regions, (ii) the scaling factor of DE is so chosen, that when the same mathematical value of scaling factor is applied to embed watermark, it can keep the trade-off between imperceptibility and robustness. The resultant covert regions are capable to uphold a high level of transparency and are robust enough to survive against attacks. The method is carried out in the spatial domain. Experimental output depicts that the proposed method maintains competent image quality. Nevertheless, the watermark can still be recognized after various attacks even if it is distorted by a significant amount.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abdelhakim AM, Abdelhakim M (2018) A time-efficient optimization for robust image watermarking using machine learning. Expert Syst Appl 100:197–210. https://doi.org/10.1016/j.eswa.2018.02.002. https://www.sciencedirect.com/science/article/pii/S0957417418300721

    Article  Google Scholar 

  2. Abdelhakim AM, Saleh HI, Nassar AM (2016) Quality metric-based fitness function for robust watermarking optimisation with bees algorithm. IET Image Process 10(3):247–252. https://doi.org/10.1049/iet-ipr.2015.0379. https://ietresearch.onlinelibrary.wiley.com/doi/abs/10.1049/iet-ipr.2015.0379

    Article  Google Scholar 

  3. Ali M, Ahn CW, Pant M (2013) An optimized watermarking technique based on de in dwt-svd domain. In: 2013 IEEE symposium on differential evolution (SDE). IEEE, pp 99–104

  4. Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using svd and differential evolution in dct domain. Optik 125(1):428–434

    Article  Google Scholar 

  5. Anushiadevi R, Praveenkumar P, Rayappan JBB, Amirtharajan R (2020) Reversible data hiding method based on pixel expansion and homomorphic encryption. J Intell Fuzzy Syst 39:2977–2990. https://doi.org/10.3233/JIFS-191478

    Article  Google Scholar 

  6. Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38:1–12. https://doi.org/10.3233/JIFS-179721

    Google Scholar 

  7. Anushiadevi R, Praveenkumar P, Rayappan JBB, Amirtharajan R (2021) Uncover the cover to recover the hidden secret-a separable reversible data hiding framework. Multimed Tools Appl 1–20. https://doi.org/10.1007/s11042-021-10729-y

  8. Araghi TK, Manaf A, Zamani M, Araghi SK (2016) A survey on digital image watermarking techniques in spatial and transform domains. Int J Adv Image Process Techn–IJIPT 3(1):6–10

    Google Scholar 

  9. Aslantas V (2008) Optimal svd based robust watermarking using differential evolution algorithm. In: Proceedings of the world congress on engineering, vol 1, pp 2–4

  10. Basu S, Debnath A, Basu A, Sankar Das T, Chattopadhyay A, Saha A (2021) Data hiding technique using differential evolution. In: Advances in electronics, communication and computing. https://doi.org/10.1007/978-981-15-8752-8_5. https://link.springer.com/chapter/10.1007/978-981-15-8752-8_5. Springer, Singapore, pp 41–50

  11. Campidoglio M, Frattolillo F, Landolfi F (2009) The copyright protection problem: challenges and suggestions. In: 2009 Fourth international conference on internet and web applications and services. IEEE, pp 522–526

  12. Debnath A, Saha A, Das TS, Basu A, Chattopadhyay A (2021) Progressive performance of watermarking using spread spectrum modulation, chap 2. Wiley, pp 5–40. https://doi.org/10.1002/9781119571452.ch2. https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119571452.ch2

  13. Goyal R, Kumar N (2014) Lsb based digital watermarking technique. Int J Appl Innov Eng Manag (IJAIEM) 3(9):15–18

    Google Scholar 

  14. Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370–380

    Article  Google Scholar 

  15. Han SC, Yang JF, Wang R, Jia GM (2018) A robust color image watermarking algorithm against rotation attacks. Optoelectron Lett 14(1):61–66

    Article  Google Scholar 

  16. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107

    Article  Google Scholar 

  17. Hong W, Chen TS (2011) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7(1):176–184

    Article  Google Scholar 

  18. Jain A (2013) Network security-the biggest challenge in communication. Adv Electron Electr Eng Res India Publ 3(7):797–804

    Google Scholar 

  19. Karaboğa D, Ökdem S (2004) A simple and global optimization algorithm for engineering problems: differential evolution algorithm. Turk J Elec Eng Comput Sci 12(1):53–60

    Google Scholar 

  20. Khanna AK, Roy NR, Verma B (2016) Digital image watermarking and its optimization using genetic algorithm. In: 2016 International conference on computing, communication and automation (ICCCA). IEEE, 1140–1144

  21. Kumar C, Singh AK, Kumar P (2020) Improved wavelet-based image watermarking through spiht. Multimed Tools Appl 79(15):11069–11082

    Article  Google Scholar 

  22. Majumder S, Das TS, Sarkar SK (2011) Dwt and svd based image watermarking scheme using noise visibility and contrast sensitivity. In: 2011 International conference on recent trends in information technology (ICRTIT). IEEE, 938–942

  23. Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process 33:134–147

    Article  Google Scholar 

  24. Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: INDIN’05. 2005 3rd IEEE international conference on industrial informatics, 2005. IEEE, pp 709–716

  25. Rashid A, Rahim MK (2016) Critical analysis of steganography “an art of hidden writing”. Int J Secur Its Appl 10(3):259–282

    Google Scholar 

  26. Robert L, Shanmugapriya T (2009) A study on digital watermarking techniques. Int J Recent Trends Eng 1(2):223

    Google Scholar 

  27. Saini LK, Shrivastava V (2014) A survey of digital watermarking techniques and its applications. Int J Comput Sci Trends Technol (IJCST) 2:3

    Google Scholar 

  28. Sharma V, Mir RN (2019) An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J King Saud Univ—Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2019.03.009. https://www.sciencedirect.com/science/article/pii/S1319157818310322

  29. Singh G (2013) A study of encryption algorithms (rsa, des, 3des and aes) for information security. Int J Comput Appl 67(19)

  30. Sinha Roy S, Saha S, Basu A (2015) Generic testing architecture for digital watermarking. In: Proceedings of FRCCD-2015, pp 978–993

  31. Storn R, Price K (1997) Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11(4):341–359

    Article  MathSciNet  Google Scholar 

  32. Strecher VJ, Greenwood T, Wang C, Dumont D (1999) Interactive multimedia and risk communication. JNCI Monographs 1999 (25):134–139. https://doi.org/10.1093/oxfordjournals.jncimonographs.a024188. https://academic.oup.com/jncimono/article-pdf/1999/25/134/2666896/134.pdf

    Article  Google Scholar 

  33. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput s22(1):91–106

    Article  Google Scholar 

  34. Su Q, Wang H, Liu D, Yuan Z, Zhang X (2020) A combined domain watermarking algorithm of color image. Multimed Tools Appl 79 (39):30023–30043. https://link.springer.com/article/10.1007/s11042-020-09436-x

    Article  Google Scholar 

  35. Sumathi C, Santanam T, Umamaheswari G (2014) A study of various steganographic techniques used for information hiding. Int J Comput Sci Eng Surv 4(6)

  36. USC, 1977 The usc-sipi image database. http://sipi.usc.edu/database/database.php?volume=misc

  37. Verma M, Yadav P (2013) Capacity and security analysis of watermark image truly imperceptible. Int J Adv Res Comput Commun Eng 2(7):2913–2917

    Google Scholar 

  38. Voyatzis G, Nikolaidis N, Pitas I (1998) Digital watermarking: an overview. In: 9Th European signal processing conference (EUSIPCO 1998), pp 1–4

  39. Wang J, Peng H, Shi P (2011) An optimal image watermarking approach based on a multi-objective genetic algorithm. Inf Sci 181 (24):5501–5514. https://doi.org/10.1016/j.ins.2011.07.040. https://www.sciencedirect.com/science/article/pii/S0020025511003793

    Article  Google Scholar 

  40. Wong M, Lau S, Chong N, Sim K (2013) A salient region watermarking scheme for digital mammogram authentication. International Journal of Innovation. Manag Technol 4(2):228

    Google Scholar 

  41. Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. J Inf Secur Appl 26:1–7

    Google Scholar 

  42. Xu H, Wang J, Kim HJ (2010) Near-optimal solution to pair-wise lsb matching via an immune programming strategy. Inf Sci 180(8):1201–1217

    Article  Google Scholar 

  43. Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by lsb substitution. Pattern Recogn 41(8):2674–2683

    Article  Google Scholar 

  44. Yuan Z, Su Q, Liu D, Zhang X (2020) A blind image watermarking scheme combining spatial domain and frequency domain. The Visual Computer 1–15. https://link.springer.com/article/10.1007/s00371-020-01945-y

  45. Yuvaraj M, Surekha P, Sumathi S (2010) An efficient optimization technique for digital watermarking in image processing. In: 2010 International conference on intelligent control and information processing. IEEE, pp 803–808

  46. Zhang X, Su Q, Yuan Z, Liu D (2020) An efficient blind color image watermarking algorithm in spatial domain combining discrete fourier transform. Optik 219:165272. https://doi.org/10.1016/j.ijleo.2020.165272 . https://www.sciencedirect.com/science/article/pii/S0030402620311086

    Article  Google Scholar 

  47. Zhou G, Lv D (2011) An overview of digital watermarking in image forensics. In: 2011 Fourth international joint conference on computational sciences and optimization. IEEE, pp 332–335

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharbari Basu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Basu, S., Debnath, A., Basu, A. et al. An image data hiding technique using Differential Evolution. Multimed Tools Appl 81, 39995–40012 (2022). https://doi.org/10.1007/s11042-022-12557-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12557-0

Keywords

Navigation