Skip to main content
Top

2018 | OriginalPaper | Chapter

A Reversible Data Hiding Scheme Using Compressive Sensing and Random Embedding

Authors : Guo-Liang Xie, Hui-Min Zhao, Ju-Jian Lv, Can-Yao Li

Published in: Advances in Brain Inspired Cognitive Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Steganography is a kind of technique which hides data under the cover file so as not to arouse any suspicion. In this paper, a new image steganography algorithm combining compressive sensing (CS) and random embedding is proposed. There are two security parts in this algorithm. The first part is the random projection inherited from CS, and the second is the random embedding process. CS serves to create the encrypted data, and acts as a tool to reduce the dimensionality of the secret data. Random-embedding algorithm is proposed to choose the position of cover image randomly for hiding the secret image. This algorithm uses symmetric key method, which means the sender and the receiver use the same key. Numerical experiments show that this steganography algorithm provides high embedding capacity and high Peak Signal Noise Ratio (PSNR).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Amirtharajan, R., Rajesh, V., Archana, P., Rayappan, J.B.B.: Pixel indicates, standard deviates: a way for random image steganography. Res. J. Inf. Technol. 5(3), 383–392 (2013) Amirtharajan, R., Rajesh, V., Archana, P., Rayappan, J.B.B.: Pixel indicates, standard deviates: a way for random image steganography. Res. J. Inf. Technol. 5(3), 383–392 (2013)
2.
go back to reference Bairagi, A.K., Mondal, S., Debnath, R.: A robust RGB channel based image steganography technique using a secret key. In: International Conference on Computer and Information Technology, Khulna, Bangladesh, pp. 81–87 (2014) Bairagi, A.K., Mondal, S., Debnath, R.: A robust RGB channel based image steganography technique using a secret key. In: International Conference on Computer and Information Technology, Khulna, Bangladesh, pp. 81–87 (2014)
3.
go back to reference Banimelhem, O., Tawalbeh, L., Mowafi, M., Al-Batati, M.: A more secure image hiding scheme using pixel adjustment and genetic algorithm. Int. J. Inf. Secur. Priv. 7(3), 1–15 (2013)CrossRef Banimelhem, O., Tawalbeh, L., Mowafi, M., Al-Batati, M.: A more secure image hiding scheme using pixel adjustment and genetic algorithm. Int. J. Inf. Secur. Priv. 7(3), 1–15 (2013)CrossRef
4.
go back to reference Cands, E.J.: The restricted isometry property and its implications for compressed sensing. C. R. Math. 346(9), 589–592 (2008)MathSciNetCrossRef Cands, E.J.: The restricted isometry property and its implications for compressed sensing. C. R. Math. 346(9), 589–592 (2008)MathSciNetCrossRef
5.
go back to reference Chan, C.S., Chang, C.C., Hu, Y.C.: Image hiding scheme using modulus function and optimal substitution table. Pattern Recognit. Image Anal. 16(2), 208–217 (2006)CrossRef Chan, C.S., Chang, C.C., Hu, Y.C.: Image hiding scheme using modulus function and optimal substitution table. Pattern Recognit. Image Anal. 16(2), 208–217 (2006)CrossRef
6.
go back to reference Chang, C.C., Nguyen, T.S., Lin, C.C.: Reversible image hiding for high image quality based on histogram shifting and local complexity. Int. J. Netw. Secur. 16(3), 208–220 (2014) Chang, C.C., Nguyen, T.S., Lin, C.C.: Reversible image hiding for high image quality based on histogram shifting and local complexity. Int. J. Netw. Secur. 16(3), 208–220 (2014)
8.
go back to reference Hossain, S.M., Haider, M.: A hybrid method of data hiding into digital images. Dhaka Univ. Stud. Part B 55(2), 203–210 (2007) Hossain, S.M., Haider, M.: A hybrid method of data hiding into digital images. Dhaka Univ. Stud. Part B 55(2), 203–210 (2007)
9.
go back to reference Liu, X., Cao, Y., Lu, P., Lu, X., Li, Y.: Optical image encryption technique based on compressed sensing and Arnold transformation. Optik Int. J. Light Electron Opt. 124(24), 6590–6593 (2013)CrossRef Liu, X., Cao, Y., Lu, P., Lu, X., Li, Y.: Optical image encryption technique based on compressed sensing and Arnold transformation. Optik Int. J. Light Electron Opt. 124(24), 6590–6593 (2013)CrossRef
10.
go back to reference Manoharan, S., Rajkumar, D.: Pixel value differencing method based on CMYK colour model. Int. J. Electron. Inf. Eng. 5 (2016) Manoharan, S., Rajkumar, D.: Pixel value differencing method based on CMYK colour model. Int. J. Electron. Inf. Eng. 5 (2016)
11.
go back to reference Mondal, S., Debnath, R., Mondal, B.K.: An improved color image steganography technique in spatial domain. In: International Conference on Electrical and Computer Engineering, pp. 582–585. Dhaka, Bangladesh (2017) Mondal, S., Debnath, R., Mondal, B.K.: An improved color image steganography technique in spatial domain. In: International Conference on Electrical and Computer Engineering, pp. 582–585. Dhaka, Bangladesh (2017)
12.
go back to reference Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)CrossRef Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)CrossRef
13.
go back to reference Qaisar, S., Bilal, R.M., Iqbal, W., Naureen, M., Lee, S.: Compressive sensing: From theory to applications, a survey. J. Commun. Netw. 15(5), 443–456 (2013)CrossRef Qaisar, S., Bilal, R.M., Iqbal, W., Naureen, M., Lee, S.: Compressive sensing: From theory to applications, a survey. J. Commun. Netw. 15(5), 443–456 (2013)CrossRef
14.
go back to reference Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: 2008 Allerton Conference on Communication, Control, and Computing, pp. 813–817. Urbana-Champaign, IL, USA (2008) Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: 2008 Allerton Conference on Communication, Control, and Computing, pp. 813–817. Urbana-Champaign, IL, USA (2008)
15.
go back to reference Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19 (2017) Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19 (2017)
16.
go back to reference Romberg, J., Tao, T.: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)CrossRef Romberg, J., Tao, T.: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)CrossRef
17.
go back to reference Singh, A., Singh, H.: An improved LSB based image Steganography technique for RGB images. In: IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1–4. Coimbatore, India (2015) Singh, A., Singh, H.: An improved LSB based image Steganography technique for RGB images. In: IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1–4. Coimbatore, India (2015)
19.
go back to reference Wang, X., Zhao, J., Liu, H.: A new image encryption algorithm based on chaos. Opt. Commun. 285(5), 562–566 (2012)CrossRef Wang, X., Zhao, J., Liu, H.: A new image encryption algorithm based on chaos. Opt. Commun. 285(5), 562–566 (2012)CrossRef
20.
go back to reference Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cognit. Comput. 8(2), 246–260 (2016)MathSciNetCrossRef Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cognit. Comput. 8(2), 246–260 (2016)MathSciNetCrossRef
Metadata
Title
A Reversible Data Hiding Scheme Using Compressive Sensing and Random Embedding
Authors
Guo-Liang Xie
Hui-Min Zhao
Ju-Jian Lv
Can-Yao Li
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00563-4_51

Premium Partner