An efficient and adaptive data-hiding scheme based on secure random matrix

There is a vivid research on securely deliver a secret message by using a data hiding technique in digital images. However, most existing solutions of data-hiding need to encrypt secret data first, and embed the encrypt message into cover image, which is not promising any security once the embedding algorithm is leaked. In this paper, an efficient and adaptive data hiding scheme is presented which is based on a new reference matrix named secure reference matrix. The scheme is flexible enough to meet different data hiding capacities and image quality as needed, and we allow the reference matrix to be more secure since it is randomly generated each time and make it much harder for being attack with exhaustive manner by extending the possible solution. We give the detail protocol for our scheme and provide the practical test and performance analysis. Experimental results show that our scheme has a better flexibility and efficiency in embedding process, and the average value of Peak Signal to Noise Ratio (PSNR) for the stego-images which are generated by our scheme have a higher visual quality for different embedding capacities, and our scheme is more efficient compared with related work.

[1]  Yi Mu,et al.  Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments , 2017, IEEE Systems Journal.

[2]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[3]  Xiaohong Jiang,et al.  Secure k-NN Query on Encrypted Cloud Data with Multiple Keys , 2017 .

[4]  Yanjun Liu,et al.  A Novel Turtle Shell Based Scheme for Data Hiding , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Jian Shen,et al.  Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds , 2019, IEEE Systems Journal.

[7]  Chin-Chen Chang,et al.  An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[8]  Jeng-Shyang Pan,et al.  Fourth International Conference on Innovative, Computing, Information and Control , 2009 .

[9]  Xiao Zhou,et al.  Data Hiding Method based on Reference Matrix , 2018 .

[10]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[11]  Lina Yao,et al.  Collaborative text categorization via exploiting sparse coefficients , 2018, World Wide Web.

[12]  X. Zhang,et al.  Improved modification direction methods , 2010, Comput. Math. Appl..

[13]  Jiann-Der Lee,et al.  International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2008 .

[14]  Chin-Chen Chang,et al.  Data hiding based on extended turtle shell matrix construction method , 2017, Multimedia Tools and Applications.

[15]  Leonardo Palacios-Luengas,et al.  A steganographic method using Bernoulli's chaotic maps , 2016, Comput. Electr. Eng..

[16]  Tung-Shou Chen,et al.  A Minimal Euclidean Distance Searching Technique for Sudoku Steganography , 2008, 2008 International Symposium on Information Science and Engineering.

[17]  Hua Wang,et al.  Editorial: Special Issue on Security and Privacy of IoT , 2017, World Wide Web.

[18]  Aparajita Ojha,et al.  Chaotic system-based secure data hiding scheme with high embedding capacity , 2018, Comput. Electr. Eng..

[19]  Chin-Chen Chang,et al.  An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..

[20]  Yanjun Liu,et al.  Fast turtle shell-based data embedding mechanisms with good visual quality , 2018, Journal of Real-Time Image Processing.

[21]  Mingwu Zhang,et al.  Accountable mobile E-commerce scheme in intelligent cloud system transactions , 2018, J. Ambient Intell. Humaniz. Comput..

[22]  Jeanne Chen,et al.  A PVD-based data hiding method with histogram preserving using pixel pair matching , 2014, Signal Process. Image Commun..

[23]  Liang Chang,et al.  A secure data backup scheme using multi-factor authentication , 2017, IET Inf. Secur..