A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT

: This work presents a new asymmetric data hiding technique that hides a variable number of secret message bits in the discrete cosine transform (DCT) coefﬁcients of a cover image using a modular distance technique. Prior to data hiding, the proposed framework transforms a cover image from a spatial domain to various frequency coefﬁcients using DCT. The DCT coefﬁcients are arranged in two groups: one with low-frequency coefﬁcient, and the other with the medium and high-frequency coefﬁcients. The medium and higher frequency coefﬁcients are processed for variable data hiding asymmetrically. The proposed technique hides variable sets of secret information bits in different coefﬁcients. The variation in hidden secret information is maintained using a key developed based on the modulo of distance of a coefﬁcient from the reference point. The same key is also used to retrieve the conﬁdential information at the receiver ends. The results reveal that the presented framework does not create any visually signiﬁcant distortion, and thus the hidden information does not attract the human visual system (HVS). The technique also results in high data hiding efﬁciency.


Introduction
The advancement in technology has brought a revolution in computer and Internet technology. The use of the Internet has increased many fold with the availability of high-speed Internet and economical hardware. Along with the development of technology, the use of social media has increased. This technology has created several problems and fueled the development of information security on top of these problems along with positive features. The researchers are developing new techniques to ensure the security of information and restrict unauthorized users' access to information. For increasing the security of hidden information, several cryptographic and data hiding techniques have been proposed [1,2].
In cryptography, the secret information is encrypted using an encryption key. The plain data (unencrypted data) is converted into cipher data (encrypted data) using encryption algorithms and the key. The encryption process changes the shape of the original information. The changes made in encrypted information are easily detectable. However, it is not easy to get the initial information without having the key. Therefore, the key plays an essential role in the security of the data. An efficient and robust cryptography technique has a large key size and provides a high level of protection.
In contrast to cryptography techniques, data hiding techniques do not change the original secret message; instead, they hide a secret message in other media called cover media [3,4]. The information is hidden innocently, and the presence of the hidden message remains unpredictable and undetectable to HVS [5]. Data hiding has received much attention due to security issues over the Internet. Usually, either cryptography or data hiding is used to secure information and secret messages. However, some forensics applications have used data hiding and cryptography and proposed several hybrid models with enhanced security.
Data hiding processes secret message bits and embed the secret message in a cover media. The possible cover medium used for data hiding includes text, audio, image, and video. The techniques used for data hiding techniques are classified in various categories based on the type of cover media used. Each cover media has its importance and plays an essential role in securing secret information using data hiding techniques. However, the cover medium with a high level of redundancy is considered much suitable for information hiding. Due to the high redundancy level of the digital image is widely used as a cover medium to accommodate secret data and transmit confidential information. Besides secure communication and information hiding, data hiding has other exciting applications, e.g., watermarking, copyright protection, data integrity assurance, and authentication of contents [6,7].
An image data hiding technique is implemented either in the spatial domain using image pixels directly or in the transform domain using transform coefficients. In the spatial domain, secret information is hidden in the least significant bits (LSBs) of image pixels, while in the transform domain, the coefficients of transformation are used to embed secret data. In the DCT domain, the DCT coefficients are used for information hiding, and the LSBs of the coefficients are replaced with the secret message bits. Similarly, the discrete wavelet transform (DWT) coefficients are used to accommodate secret data inside it by replacing the LSB of the DWT coefficient with the bits of secret information. After hiding information, the stego image is obtained with hidden information inside it. The spatial domain techniques directly result in stego images, while in the transform domain, the modified transform coefficients cover image are converted back by taking the inverse transform.
This paper presents a novel image data hiding technique in the transform domain, where the DCT coefficient of the cover image is used as media. The proposed method hides a different number of secret message bits in the LSBs of DCT coefficients of the cover image under test. The technique applies DCT to a cover image and gets an array of DCT coefficients. The DCT coefficients are classified into two groups. The group of low-frequency coefficients, having maximum energy of the image, and another group contains medium and high-frequency components. The low-frequency coefficients are not modified, while the rest of DCT components are subjected to hiding, and secret message bits are embedded in these components using the proposed framework. Different frequency coefficients are processed for information hiding using variable LSBs substitution mechanisms. The variation of the hidden information is achieved with the help of a modular distance technique (MDT) using a stego key. The stego key contains the information details of the number of hidden bits in different DCT coefficients. The stego key plays an essential role in the retrieval process. That is why it is kept secret and shared only with the intended party through a trusted third-party.
The rest of the paper is organized as follows. Section 2 presents the related work. The implementation of the proposed technique is presented in Section 3. Section 4 presents the details of the experiments performed, the results obtained, and analysis of the result. Comparison of the proposed technique with previous data hiding methods is presented in Section 5, and finally the paper is concluded in Section 6.

Related Work
This section presents a brief review of both the spatial and transform domains' image data hiding techniques. The first couple of data hiding techniques were introduced by Honsinger et al. and Fridrich et al. [8,9]. The methods used the LSBs of the cover image and embedded fixed amount of secret data per pixel. These techniques resulted in high-quality stego images; however, the hidden information can be recovered quickly, due to fixed data hiding, if its presence is suspected.
Lin et al. [10] used compressed images for information hiding. They proposed utilizing a prediction technique and judgment process to efficiently choose the embeddable blocks in data hiding, extraction, and recovery stages. At the end of image compression, the processed image was used for watermarking and steganography [11,12].
A framework for information hiding was introduced by hiding secret data in the edges of cover images only and preserving the rest of image quality and leaving the smooth region element unmodified. This set of data hiding methods includes LSB methods [13], side-match methods [13,14], PVD-based methods, and other techniques [15,16]. Besides the good quality of resulting stego images, these methods have a very minimal and small hiding capacity [14,[17][18][19]. A new technique with high data hiding capacity was proposed in [20] to hide secret messages in the pixels that belong to edges. The complex region is isolated from the smooth region using the ACO algorithm [21,22]. The ACO-based complex region detection framework [18] is used for data hiding in combination with the 4LSB data hiding mechanism.
The spatial domain data hiding techniques discussed hide a fixed number of bits either in all pixels of a cover image or in the pixels that belong to the complex region. To further enhance the protection level of secret information, a set of techniques were proposed, hiding variable number secret information bits in the LSBs cover images. This idea was initially used in [23] for information hiding using random LSB of the cover image for hiding the secret message. A set of new techniques were presented in [24][25][26] to hide variable amounts of secret data in the LSBs of the cover medium pixels.
Along with the spatial domain, various data hiding methods were presented and implemented in the transform domain. A set of reversible data hiding techniques using DCT include data hiding schemes proposed by Iwata et al. [27], Chang et al. [28], Lin and Shiu [29], and Lin et al. [30]. In [31,32], a framework for data hiding was proposed. This method used DCT and singular value decomposition (SVD) collectively for information hiding [31,32]. They recommend a watermarking framework based on DCT, DWT, and SVD. They divided the image into four quadrants using a zigzag series after applying DCT. Then each quadrant is processed using SVD to adjust the watermark. The algorithm resulted in high quality of images and proved robust to various attacks. In [33,34], the authors used all four frequency bands of DWT combined SVD for watermarking. The experimental results show that Lin et al.'s method [30] gives the best magnitude of wavelet coefficient and singular values [35,36].
In [33], a block matching approach was used for the data hiding technique using DWT. In [29], a random key-based data hiding technique is proposed. The idea of stream cipher linear-feedback shift register (LFSR) is used for random key generation. Another method of data hiding in RGB images can be found in [37]; it combines the matrix pattern (MP) and LSB substitution techniques. Various forensics experts explore several other data hiding techniques, and they presented some very efficient steganographic methods that improved the security of the hidden information. In [38], data hiding is presented using two quantization levels of each block of AMBTC using Hamming codes. However, the distortion error of the technique is relatively large. Kingsley and Barmawi [39] proposed a code-based data hiding technique using multiple embedding framework. Further details of the steganographic techniques can be found in [40,41].

The Proposed Technique
The proposed technique hides the bits of secret message in the LSBs of the DCT coefficient of a cover image in an asymmetric manner, i.e., hiding the different number of bits in different coefficients. The proposed method is an inspiration from the VTVB data hiding technique [42]. The proposed technique and VTVB data hiding technique hides a variable amount of secret data in DCT coefficients using a Stego Key . However, then the proposed technique is different from VTVB data hiding in several aspects. First, the VTVB data hiding technique hides secret message bits in all DCT coefficients, i.e., low-, medium, and high-frequency coefficients, which creates a blurring effect stego image.
Moreover, the proposed technique excludes the lower frequency coefficient of DCT, enhancing the quality of the stego image. Other differences are the stego key and using the Stego Key for data hiding. The VTVB technique considers a 2D array of the DCT coefficients. VTVB then hides secret data by processing the DCT coefficients row by row. The Stego Key is initialized at the beginning of each row, which is the VTVB technique's weakness. An intruder will target only the first block of coefficients of each row of DCT array to crack the algorithm. The proposed technique does not initialize the Stego Key for each row, instead, it uses the DCT coefficient arranged in a vector. The other problem with the VTVB data hiding technique is when the number of DCT array columns is not completely divisible by the size of Stego Key . For example, if the number of columns in a DCT array is 100 and the Stego Key size is 15, the key will completely cover the first 90 coefficients of each row. In each row, we are left with 10 coefficients and 15 Stego Key elements. What will be the solution to this problem? The VTVB technique is silent about this. This also creates a problem during the recovery of the secret data, and even the authorized person cannot recover secret data.
In contrast, the proposed technique does not suffer from this problem as it arranges DCT coefficients in a 1D vector. The generation and organization of the proposed technique's Stego Key are also different from the VTVB technique. The proposed technique has solved the problem of VTVB data hiding techniques.
To hide secret message bits in the DCT coefficient of a cover image. Initially, a cover image under test is processed using DCT, and an array of DCT coefficients is obtained. As we know that most of the energy of an image exists in the low-frequency components of the DCT array, any modification made in high-energy component creates relatively higher distortion. The high energy components, i.e., lower frequency coefficients of DCT array, are not used for information hiding. Therefore the DCT coefficients are classified into two groups-the group of low-frequency coefficients and other groups of medium and high-frequency coefficients. The medium and high-frequency coefficients of DCT array are used for information hiding. The frequency coefficients are subjected to variable data hiding, and different numbers of secret message bits are embedded in the different coefficients of the DCT array. The variable data hiding is implemented using the MDT framework.
The proposed technique is implemented using the following steps: • DCT coefficients extraction • Classification of DCT coefficients • VTVB [42] data hiding using MDT • Information retrieval Each of these steps is explained with detail in the subsequent sections.

DCT Coefficients Extraction
DCT performs a real transformation to convert actual data points into its real spectrum to avoid redundancy. Using the proposed technique for secret information concealing the cover image under consideration is processed using DCT transform to cover the images into statistically independent coefficients. The interdependencies among the coefficient are removed to gain insight into the image details such as edges, energy, ... etc. It also makes the separation of the high energy coefficients from the rest of the coefficients very easy [43].
Let us consider a cover image Cov having size (R × C), where R and C represent the number rows and columns, respectively. The cover image Cov processed using DCT transform and an array of DCT coefficient DCT coe f is obtained. The DCT coe f is of the same dimension as that of cover image Cov, i.e., (R × C). The DCT coe f is computed as expressed in Equation (1) [44]. and The DCT organized the frequency coefficient of an image in order of frequencies, placing the lower frequency coefficients first, and then higher frequency coefficients are placed in the array. The array of DCT coefficients has lower coefficients on the top left. The higher coefficients on the bottom right and the middle section of the array contain the medium frequency components.

Classification of DCT Coefficients
As discussed previously, the DCT coefficients are classified into two groups. Before classification, the DCT coefficients matrix is converted into vector DCT z of size L = R × C, using the zigzag pattern as expressed in Equation (4).
After, the arrangement of DCT coefficient in a single vector, the coefficient are classified in two groups; high-energy coefficients and low-energy coefficients. The classification is expressed in Equations (5) and (6).
Here, it is important to mention that 25% of low-frequency coefficients are assigned to the group of high-energy frequency coefficients' group, while the rest of 75% coefficient are assigned to the second group and are used for data hiding.

Data Hiding
The data hiding process is initiated after the successful classification of DCT coefficients. The data hiding process is performed based on the key (Stego Key ). The Stego Key defines the number of secret bits that are hidden in a particular DCT coefficient. The Stego Key ensures the hiding algorithm's asymmetry and plays a vital role in retrieving the hidden information. Based on the Stego Key , a different number of secret message bits are hidden in different coefficients. The variation in the amount of data bits hidden in various DCT coefficients is achieved with the MDT algorithm and the Stego Key . The MDT algorithm ensures the variability of the hidden bits and protects information in the DCT coefficients in the following manner.
The MDT algorithm takes the DCT Rcoe f vector and selects a reference coefficient, let say (r). Then, each of the coefficients in the array is processed for data hiding one by one. The distance dm between the reference point and the DCT coefficient under test DCT Rcoe f (j) is computed using the Euclidean distance method as expressed in Equation (7).
Then, a number called pattern factor P f is used. The value of P f is equal to the size of Stego Key . It is used to determine the pattern of variation of the number of bits used for data hiding. P f is the number of DCT coefficients, after which the number bits used for data hiding are repeated. After setting the P f , the other factor m is computed as expressed in Equation (8).
where the function mod(.) is called the modulo operation and returns the remainder after division. The factor m is responsible for deciding the number of bits to be hidden in a coefficient, and it also set the size of the Stego Key . The higher the value of m the larger the size of Stego Key , and therefore the more secure the information is. The large key size makes it difficult to break the data hiding technique and retrieve the hidden information. A sample Stego Key of the proposed technique is presented in Equation (9).
After deciding the factor P f , computing m, and fixing the Stego Key , the information hiding process starts. The hiding process results in a vector of modified DCT coefficients called stego DCT coefficient Steg DCT . The Steg DCT is of the size as that of DCT Rcoe f . The data hiding process is expressed in Equation (10).
where DH(.) is the data hiding function that hides secret data bits in the LSBs of the selected DCT coefficients, the data hiding function DH(.) uses an LSB substitution mechanism for replacing the LSBs of the selected DCT coefficients with secret data bits. DCT Rcoe f (i) and Steg DCT (i) represent the ith coefficient of DCT Rcoe f and Steg DCT vectors, respectively. The B j represents a set of secret message bits selected as the jth element of the Stego Key , i.e., b j . The suffix i represents the ith DCT coefficient subjected to data hiding and j is the index of the jth element of the Stego Key . Finally, a stego image is obtained by taking the inverse DCT of the modified coefficients. That is Steg DCT (i), as expressed in Equation (11).
Implementation of the porposed technique is summarized in the block diagram presented in Figure 1.  The stego image Steg image is compared with the original cover image Cov by computing the quality measuring parameters (e.g., PSNR and SSI M). The same evaluation metrics and hiding capacity are used to compare the proposed technique with previous work.

Information Retrieval
Hiding secret data in the DCT coefficient of the cover image is an important operation performed on the source side. Along with hiding, it is also important to retrieve all the hidden information efficiently with full strength. Information retrieval is a process that ensures the 100% recovery of hidden information of the receiver side. The proposed data hiding technique is reversible, and the reverse process can be used to retrieve the hidden information. To retrieve the information hidden using the proposed framework, we need to perform DCT some prior step of the data hiding process, i.e., DCT coefficients extraction and classification of the DCT coefficients.
For retrieving the hidden information, DCT transform is applied to the stego image Steg image , as expressed in Equation (12).
Steg dct−coe f = DCT Steg image The array of DCT coefficients Steg dct−coe f is converted into a vector of the DCT coefficient using the zigzag scanning approach, as expressed in Equation (13).
The DCT coefficients in the vector Steg dct−vec are classified into two groups, i.e., low-frequency coefficient group and group consist medium and high-frequency coefficients, as expressed in Equations (5) and (6), respectively. The group of DCT coefficients, consisting of the medium and high-frequency coefficient, has hidden information. These coefficients are processed for information retrieval. The stego key, i.e., Stego Key , plays an important role at this stage. Without the Stego Key , it is not impossible to retrieve the hidden information. All the DCT coefficients are processed for computing the factor m, processing one coefficient at a time. The Stego Key and m, both are used to retrieve the hidden information. The hidden information is retrieved by extracting the LSB of the DCT coefficients, using the Stego Key and m. This process ensures the 100% recovery of the hidden information. The retrieval process is presented in Figure 2.

Evaluation Metrics
The proposed data hiding technique's performance is measured and analyzed using the evaluation measure of hiding capacity (HC), and peak signal to noise ratio (PSNR) and structural similarity (SSI M). The HC and PSNR are defined by Equations (14) and (15), respectively [45].
where MSE is the mean square error and is given as The SSI M [46] is mathematically expressed as where µ Cov is the mean of Cov, µ Steg image is the mean of Steg image , σ 2 Cov is the variance of Cov, σ 2 Steg image is the variance of Steg image , σ Cov Steg image is the covariance of Cov and Steg image , C 1 and C 2 are the factors used to stabilize the division with weak denominator.
The hiding capacity HC of the proposed method depends on the number of bits hidden in different coefficients, which is defined by Stego Key . Similarly, the PSNR and other quality measuring parameters also depend on the amount of data hidden in the cover image. Hiding more data in DCT components increases HC; however, it creates more distortion. The distortion may become significant with an extensive hiding data in the cover image. For an efficient data hiding technique, the stego image quality should be higher than 30 dB in terms of PSNR.

Experimental Results and Analysis
The performance of the proposed technique is analyzed using different experiments. Initially, one cover image called Building, as given in Figure 3, is used for experiments. The cover images are used for information using the proposed technique and using different sego keys. Before data hiding, the DCT is applied to the cover image in Figure 3, and the array of DCT coefficients are computed. The DCT coefficients are classified as discussed in the Section 3.2. The high-energy coefficients, i.e., the low-frequency components, are left unaffected. The low-energy components, i.e., medium and high-frequency components, are processed for data hiding using Stego Key of different sizes, as discussed in Section 3.3.
In the first experiment, the medium and high DCT coefficients of the cover image are subjected to data hiding using the proposed method, with a key size equal to 2. The key used is given as Only two different numbers of bits are used for embedding purposes. After hiding information in the selected DCT coefficients, the modified DCT coefficients are processed with IDCT transform to get a stego image. The stego image obtained is shown in Figure 4.
The resulting stego image shows that for the given key proposed algorithm creates a high-quality stego image. It also shows that the presence of hidden information is not detectable to HVS. Therefore, the proposed technique can be used for the secure exchange of secret data. The experiment is repeated using the medium and high DCT coefficients of the same cover image. The DCT coefficients are subjected to data hiding using the proposed technique, with a key size equal to 3. The used key is The resulting stego image is illustrated in Figure 5 and it shows that the given key proposed algorithm also creates a high-quality stego image and keeps hidden information undetectable to humans. In the third experiment, a key of size 4 is used to hide secret information in the medium and high DCT coefficients of the same cover image. Secret information is hidden in the DCT coefficients. The Stego Key is The resulting stego image is shown in Figure 6. It shows that the given key proposed algorithm also generates a high-quality stego image. The experiment is repeated with a key of size 5, and information is embedded in the selected group of DCT coefficients of the same cover image, where the used key in this case is The resulting stego image having good visual quality is shown in Figure 7.
Using the medium and high-frequency coefficients of the cover image in Figure 3, the experiment is repeated for Stego Key of size 6 and 7. The stego keys of size 6 and 7 are expressed in Equations (22) and (23), respectively.
Each of the keys is used to hide secret information in the DCT coefficients and the stego image is obtained for each experiment. The stego images generated with Stego Key of size 6 and 7 are given in Figures 8 and 9, respectively.   The results show that both of these keys of size 6 and 7, generate high-quality stego images. The hidden data does not attract the attention of HVS and therefore keeps the existence of hidden information blind to intruders.
Along with stego images, the performance of the proposed algorithm is evaluated quantitatively by computing HC, PSNR, and SSI M. The evaluation metrics are obtained for each experiment performed with stego keys of different sizes, (2, 3, 4, 5, 6, and 7). The results obtained are listed in Table 1. These results prove that the proposed algorithm can hide secret information with high hiding efficiency. The results indicate that for the given keys as the key size increase from 2 to 4, the hiding capacity increases from 12.2743% to 24.5486% and with further increase in key size as a reduction in hiding capacity occurs. Similarly, looking into the results obtained in terms of PSNR and SSI M, the quality of stego images increases and decreases with an increase or decrease in hiding capacity, respectively.
Here, it is important to mention that it is not crucial to have a monotonic increase in the number of bit in a stego key. The number of bits can be arranged in any order, and any value from 0 to 8 can be used. For example, we can use a key of size 25, given in Equation (24), with a different number of bits to be hidden in different DCT coefficients.
In the last part of experimentation, a single cover image, Building for data hiding with different Stego Key s. For evaluating a data hiding technique, single image experimentation and results are not enough to prove and justify the effectiveness of performance compared with other state-of-the-art techniques. Therefore, the data hiding technique's performance is further evaluated using different cover images, e.g., Cameraman, Jelly Beans, Lena, Mandrill, Pepper, and Tiffany, shown in Figures 10a-15a, respectively. The cover images are processed for data hiding using the proposed method with stego key of size 7. Where Stego Key = {1, 2, 3, 4, 5, 6, 7}.
The resulting stego images are shown in Figures 10b-15b, respectively. The cover Figure 10a, is subjected to data hiding stego image with hidden information inside it is obtained. The resulting stego image in Figure 10b, showing the proposed technique generates a high-quality stego image, and the quality of the stego image is almost the same as that of the original cover image. There is no visually compelling distortion present in the stego image. Therefore, the proposed technique is equally effective in the Cameraman image. The Jelly Beans image, the cover Figure 11a is subjected to data hiding with the same key size of 7, and the stego image with hidden information inside it is obtained as shown in Figure 11b.
The resulting stego image shows the proposed technique also generates high-quality stego images using Jelly Beans images as cover. The quality of the stego image is similar to the original cover image. There is no visually compelling distortion present in the stego image. Therefore, the proposed technique is equally effective in the Cameraman image.  Similarly, the experiment is repeated for the rest of the images, i.e., Lena, Mandrill, Pepper, and Tiffany. Each image is used as a cover image one by one, and information is hidden in selected DCT coefficients of the cover images. The stego key of size 7 is also used in each of the experiments. The cover images and corresponding stego images are shown side by side to make a better qualitative analysis. The result shows that the proposed technique generates good quality stego image in each of the experiments. Qualitative analysis shows that the hidden information does not contribute any significant distortion using the proposed technique. The quality of each of the resulting stego images resembles that of the original one. Therefore, the hidden information does not attract the intruders' attention and is considered safe. From all the results, it can be concluded that the proposed technique is an efficient data hiding and is a new contribution to the field of data security. The quantitative results obtained for the different cover images are listed in Table 2. The results show that the proposed technique has a hiding capacity of around 12% for all the different cover images. While the PSNR of the proposed technique is also very high, a maximum PSNR of 48.82 dB is obtained using Mandrill as a cover image. Similarly, the values of SSI M obtained on different images are very high and remain above 0.9 for the cover images except for Jelly Beans. The SSI M obtained for the Jelly Beans image is slightly lower than the other and is equal to 0.8709. Along with the high-quality stego image and large HC, the proposed technique strength and robustness against different steganalysis and cracking technique is also analyzed. The proposed technique is tested against different steganalysis attacks using StegExpose [47], StegSecret [48], and Jia-Fa method [49]. The experimental results revealed that the proposed technique is robust against spatial and DCT domain steganalysis attacks.

Comparison
A steganographic technique aims to ensure the security of secret information by hiding it in some cover medium. Several steganographic techniques are available in the literature. The selection of a suitable steganographic method, among the possible, is essential and plays a vital role in achieving excellence in information security. A proper steganographic technique has a high capacity to hide without affecting the quality of resulting stego images.
The results in Table 3 show that the proposed technique has a HC of 12.291%, which is higher than the most of the methods except for Wang et al. [57] and Lee and Chen [59] methods, which have higher HC than the proposed technique. The PSNR of the proposed technique is also higher than or comparable with most of the methods except those of Alam et al., Lin and Li, and Wang et al. [62]. However, these three techniques have a lower HC than the proposed technique. Similarly, the SSI M computed for the proposed technique is much higher than the rest of the methods. The overall analysis shows that the proposed technique has better or comparable performance with respect to the other data hiding techniques. The quantitative results obtained for different data hiding technique using Mandrill are listed in Table 4. The results show that the proposed technique also has a HC of 12.291% for Mandrill images. The HC of the proposed technique is higher than most of the methods except for Wang et al. [57] and Lee and Chen [59] method. The two techniques have HC higher than the proposed technique. The proposed technique has PSNR higher than or comparable with the majority of the given technique.
In comparison, the data hiding techniques of Alam et al., Lin and Li, and Wang et al. [62] have higher PSNR values than the proposed technique. However, the three techniques have lower performance than the proposed technique in terms of HC. Similarly, the computed SSI M for the proposed technique is much better than the rest of these methods. Similar to Lena and Mandrill, the comparison is also made on using Pepper as a cover image. The quantitative results are shown in Table 5. The experimental results reveal that the proposed technique performs better than most of the techniques in terms of HC. Similarly, the proposed technique's performance is also better than, or comparable with, the majority of the techniques in terms of PSNR. However, the proposed technique has a lower PSNR than the techniques of Alam et al., Lin and Li, Wang et al. [62], and Huang et al. using the Pepper image as cover media. However, the performance of the four techniques is lower and have lower HC than the proposed technique. Similarly, the SSI M computed for the proposed technique is much higher than the rest of the methods. The overall analysis shows that the proposed technique has better or comparable performance with respect to the other data hiding techniques.
The experimental results show that the performance of the proposed technique is either better or comparable with the previous data hiding techniques performance, which shows the strength of the proposed technique. Furthermore, the proposed technique asymmetrically hides secret information by embedding different numbers of secret message bits in different DCT coefficients of the cover images and have a stego key of significantly large size, which further enhances the security of the hidden information. While the other techniques presented in the comparison section have fixed data hiding, it is easier to crack or break a data hiding technique with fixed data hiding. The high security of hidden information with large key size, high HC, PSNR, and SSI M is the main strength of the proposed technique.

Conclusions
The proposed variable data hiding technique is a new approach for hiding secret messages in DCT coefficients of cover images. It uses medium and high-frequency coefficients for embedding secret data and hides the different amounts of confidential data in the various coefficients. The variable data hiding enhances the security of hidden information. Also, it has a flexible data hiding capacity and can be changed depending on the application by changing the stego key. Furthermore, the stego key of the proposed method is quite large and changeable. The large stego key strengthens the security further.
Along with high data hiding capacity and sizable key size, the proposed technique gives high-quality stego images. The hidden information does not introduce any visually significant distortion to the resulting stego images, and therefore keeps the existence of secret data invisible. The proposed technique can be used in different applications, such as the exchange of information in a secure manner, image steganography, watermarking, and secure data communication over Internet of things (IoT).