Next Article in Journal
Overhead Power Line Damage Detection: An Innovative Approach Using Enhanced YOLOv8
Next Article in Special Issue
Cyber5Gym: An Integrated Framework for 5G Cybersecurity Training
Previous Article in Journal
Enhancement of the Synaptic Performance of Phosphorus-Enriched, Electric Double-Layer, Thin-Film Transistors
Previous Article in Special Issue
ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting

1
Department of Computer Science and Information Engineering, National Chiayi University, Chiayi City 60004, Taiwan
2
Department of Computer Science and Information Engineering, National Central University, Taoyuan City 32001, Taiwan
3
International Bachelor’s Program in Informatics, Yuan Ze University, Taoyuan City 32003, Taiwan
4
Department of Information Management, Yuan Ze University, Taoyuan City 32003, Taiwan
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(4), 738; https://doi.org/10.3390/electronics13040738
Submission received: 22 December 2023 / Revised: 7 February 2024 / Accepted: 8 February 2024 / Published: 12 February 2024

Abstract

:
The whole world is quickly transforming into an information world with the setup of smart cities, among other things. Information and other forms of privacy are therefore at risk due to the growing intelligence of hackers. Therefore, to enhance the security of information, a capacity-raising interpolation method based on histogram shifting is proposed. According to the experimental results, the capacity-raising interpolation method based on histogram shifting produces high-quality images with a significantly high embedding capacity, outperforming other methods. Apart from the already-mentioned advantages, the proposed method is reversible and can recover images in a lossless manner.

1. Introduction

The internet age has seen a vast amount of developments in all aspects of the internet and information and technology. Such technology includes, but is not limited to, media, especially digital media such as videos, images, and audio. All of these are vulnerable to hacking and thereby raise a security risk, as unauthorized personnel could access information. To solve this problem, computer scientists and information security engineers have developed some techniques, and these techniques include cryptography [1] and data hiding techniques [2]. The aforementioned problems are mainly a result of shared channels [3]. Cryptography mainly refers to using a mathematical function such as a hashing function to encode a message such that it cannot be understood and is unusable without a decryption key [4].
Steganography [5] is one of the many data-hiding techniques available. In steganography, many types of media can be used, which include images, videos, and audio. Steganography is simply a method of embedding messages into any of these already-mentioned media types. Steganography should not be confused with cryptography, but should be understood as information hiding. Of note is that encrypted messages can also be hidden in these types of media.
In information hiding, the aforementioned multimedia may suffer permanent distortion depending on the data-hiding technique used. Sometimes, permanent distortion cannot be tolerated; therefore, many different reversible data-hiding schemes have been proposed. These data-hiding schemes are meant to extract information and recover the cover image in a lossless manner [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21]. Some of these reversible data-hiding schemes (RDH) include difference expansion (DE); histogram shifting (HS) [6], from which the proposed method draws some ideas; prediction error (PE) [7,10,19], from which some ideas were drawn; and pixel value ordering (PVO) [13,14,15,16,20,21], which shall be compared with the proposed method in the results section of this paper. Reversible data hiding [15] involves embedding information into host data while maintaining the ability to fully recover both the original host data and the hidden information. This method ensures that no data loss occurs during the embedding process, allowing for accurate retrieval. Reversible data hiding also allows for the integrity of the host data to be preserved, making it suitable for applications where accuracy is crucial. For example, in hospitals, information can be hidden in medical images, and both the hidden data and the original medical image should be recoverable. Non-reversible data hiding, on the other hand, involves embedding information in a way that compromises the ability to fully recover the original host data. This method is often used for security or copyright protection, but comes with inherent data loss.
The above schemes can generate different types of resolution images. Although not mentioned above, one scheme to generate high-resolution images is image interpolation [8,12]. It is, therefore, needless to say that interpolation can be used in combination with other schemes to generate a better algorithm with a good imperceptibility and embedding capacity. The interpolated image usually has different values as compared to the original image, and through this, data hiding can occur at a larger scale. Some of the known existing interpolation methods include neighboring pixels, enhanced neighboring mean interpolation, and modified neighbor mean interpolation, among many others.
During the embedding process in data hiding, one or more stego images are generated depending on the data hiding algorithm used. A stego image, short for steganography image, refers to an image that has been altered to conceal the presence of hidden information.
In this paper, we propose a four-stage interpolation-reversible data-hiding method with high visual image quality and a high embedding capacity (EC). In the first stage, we downsize the original image using selected fixed pixels. In the second stage, we interpolate the downsized image pixels to obtain new pixels, and from there, we move on to stage three, where we calculate the prediction errors. The last stage involves adjusting the prediction errors using the given secret binary message. During the last stage, shifting and embedding are performed with a maximum of one bit, thus increasing the embedding capacity of the proposed method.
The rest of this paper is organized into four sections. In Section 2, related works are reviewed. In Section 3, the proposed method is described. In Section 4, the experimental results are shown and discussed. The conclusions are presented in Section 5.

2. Related Works

This section introduces and reviews various reversible data-hiding methods, including enhanced neighbor mean interpolation (ENMI), the conventional PEE method, and the pixel-based pixel value ordering (PVO) method. The conceptual basis of our method aligns with the aforementioned schemes, which are further elaborated in the following section.

2.1. Conventional Prediction Error Expansion

Thodi et al. [9] introduced a novel prediction expansion (PEE) method within the context of reversible data hiding. In their proposed approach, they employed gradient-adjusted prediction (GAP) to predict the pixel values of the cover image subsequent to determining the predicted sequence. Prediction errors were computed across the cover pixels, and the prediction error sequence guided the prediction of pixel values. The resulting prediction error sequence was utilized to generate prediction error histograms (PEHs). Subsequently, secret messages could be embedded by expanding and shifting the histogram. This process led to the creation of a stego image. The embedding procedure for the aforementioned PEE method adheres to the following sequence:
Step 1. Divide the cover image C into 2 × 2 non-overlapping blocks, as shown in Figure 1. Here, x1, shown in a yellow highlight, is the current pixel, and ci, i = 1 to 3, are the neighboring pixels.
Step 2. Contemplate the present pixel x1 employ the gradient-adjusted prediction (GAP) predictor, as depicted in Equation (1), to derive the predicted pixel i.
x ^ i = max c 2 , c 3 ,     i f   c 1 min c 2 , c 3   min c 2 , c 3 ,     i f   c 1 max c 2 , c 3     c 2 + c 3 c 1 ,     o t h e r w i s e            
Step 3. Compute the prediction error Pi by considering neighboring pixels and the predicted image, utilizing Equation (2).
P i = x i x ^ i  
Step 4. Aggregate all prediction errors Pi to formulate a histogram.
Step 5. Identify the threshold T and employ Equation (3) to conceal the binary secret in an expanding and shifting manner.
P i = 2 P i + s ,                   i f   P i ϵ T , T   P i + T ,                       i f   P i ϵ T , + P i s ,                       i f   P i ϵ , T    
Step 6. Utilize Equation (4) to calculate the stego-pixel x′i. Repeat this process for all stego pixels, culminating in the construction of the stego image S.
x i = P i + x ^      

2.2. Pixel-Based Pixel Value Ordering Predictor

In 2007, an improved PVO method called pixel-based pixel value (PPVO) was proposed by Qu and Kim [10]. According to their proposition, their method could predict pixels using sorted context pixels. The smallest and largest pixel values were used to predict the value, and this meant that their method could predict almost all pixels, thus preserving more space for carrying secret messages, thereby increasing the embedding capacity. Their embedding process can be summarized in the following steps:
Step 1. Process pixels to avoid overflow/underflow by changing the boundary pixels of images 0 and 255 to 1 and 254, respectively, and then recording the processed pixel positions on a location map (LM).
Step 2. Select context pixels, define neighboring pixels, and predict pixels C.
Step 3. Determine the maximum and minimum pixel values within the context of the prediction context pixels, Cmax and Cmin, respectively. Throughout the data embedding phase, classify each prediction pixel of t into one of four sets, W1–W4, using Equation (5).
W 1 = t C m a x C m i n , t C m a x W 2 = t C m a x C m i n , t C m a x W 3 = t C m a x = C m i n , t C m a x , C m i n 254 W 4 = t C m a x = C m i n , t C m a x , C m i n = 254
Step 4. Using Equation (6), determine the pre-predicted value Ptd. If the pixels are not in any of the above-discussed sets, the pixels cannot hide any secret bit.
P t d =   C m a x   ,     i f   t W 1 W 4   C m i n   ,     i f   t W 2 W 3
Step 5. The prediction error e is computed utilizing Equation (7).
e = t P t d
Step 6. The binary secret bit is embedded into the prediction error e, and a new prediction error e’ is obtained based on Equation (8).
e = e + b ,     i f   t   W 1 W 4   a n d   e = 0   e + 1 ,     i f   t   W 1 W 4   a n d   e > 0   e b ,     i f   t   W 2 W 3   a n d   e = 0   e b ,     i f   t   W 2 W 3   a n d   e < 0  
Step7. Compute the stego pixel t’ by using Equation (9).
t = P t d e

2.3. Enhanced Neighbor Mean Interpolation (ENMI)

To enhance the visual quality of magnified images, Chang et al. [11] introduced an extension of the interpolation method proposed by Lee and Huang [12], known as interpolation by neighboring pixels (NMI). Using this approach, the computational procedure for diagonal pixels in NMI was substituted with the average of the four closest original pixels, as depicted in Figure 2. It is important to emphasize that this modification adheres strictly to the original equation and format. The blue color in Figure 2 shows the fixed pixels.

2.4. Research Motivation

The previously mentioned techniques, namely, conventional prediction error expansion and pixel-based pixel value ordering predictor, demonstrate proficiency in generating stego images characterized by elevated PSNR values. Nevertheless, these methodologies exhibit shortcomings in terms of security and embedding capacity. A primary deficiency in conventional prediction error expansion lies in its susceptibility to sophisticated attacks. The method is vulnerable to statistical analysis, which may enable adversaries to discern patterns and potentially unveil concealed information.
Conventional prediction error expansion facilitates data concealment within prediction errors; however, its embedding capacity is constrained. The method encounters challenges accommodating larger volumes of data without compromising the quality of the resultant stego content. Such limitations pose practical hindrances in applications necessitating substantial data-hiding capabilities. Analogously, the pixel-based pixel value ordering predictor method faces analogous constraints.
To facilitate the secure transmission of larger volumes of data, we propose a high-payload scheme grounded in interpolation and histogram shifting. In Section 3, we describe our proposed method.

3. Proposed Method

This section provides a detailed introduction to the proposed method, which is based on enhanced neighbor mean interpolation (ENMI) [11]. The framework of the proposed method is depicted in Figure 3. On the sender side, prior to the embedding process, the image boundary pixels are adjusted, and the adjusted pixel locations are recorded in a location map (LM), which is then compressed into a compressed location map (CLM), shown with a blue background in Figure 3. The image with adjusted boundary pixels is then downsampled. The downsized image with fixed pixel values is used to make an interpolated image. Prediction errors are then calculated. These prediction errors are then adjusted using the secret message (bits) or by shifting. On the receiver side, we first downsample the received stego image and then perform image interpolation. Prediction errors are calculated and adjusted to recover the image and also to extract the secret message. The received compressed location map (LM) is decompressed, the decompressed location map is used to readjust the recovered image, and a fully recovered image is attained. The proposed method was adapted from Chang et al. [11], although it does not follow the same procedures as ENMI [11].

3.1. Overflow/Underflow

Prior to delving into a comprehensive discussion of the proposed method, it is imperative to acknowledge that the introduced approach is vulnerable to underflow and overflow at the boundary pixels of 0 and 255. This susceptibility may give rise to minor distortions. The distortion in this method may not be severe, since embedding and shifting are accomplished by −3 and 3, as shall be discussed below. To avoid this situation, the boundary pixels 0 and 255 were changed by 3 units. The grounds for changing by one unit are based on the shifting and embedding being conducted by a three-value unit (3 and −3). As an illustration, 0 has been altered to 3, and 255 has been adjusted to 252. These boundary pixels necessitate preprocessing, after which a location map (LM) is employed to retain pixel information, ensuring pixel reversibility. Utilizing arithmetic coding, the LM can be condensed to generate a compressed location map (CLM).

3.2. Embedding

The embedding process is conducted in a series of steps to obtain the stego image. These steps include downsampling, the interpolation process, calculation of prediction errors, adjustments to prediction errors, and secret embedding and generation of the stego image.

3.2.1. Downsampling

In this step, the image has to be sampled using certain fixed pixel values. The choice of fixed pixel values for utilization during the downsampling process can be executed through various methods, and these methodologies do not impact the performance of the proposed method. For illustration in this method, odd pixel positions were selected as the fixed pixel positions from both the row R and column C., i.e.,
Ri = {1|3|5|…………………………n},
Ci = {1|3|5|…………………………n}
where n is an infinite positive odd number. Please note that both C and R must be odd if the pixel position is to be considered as a fixed pixel position. The downsampled pixel is referred to as dy. The selected fixed pixel position values are used as the downsampled pixels. Figure 4 is an example to demonstrate this. The yellow highlight represents the fixed pixel positions while the arrows show these fixed pixel positions which are used during downsampling:
In this example, the downsampling process is demonstrated using four fixed pixels selected through the row and column odd position number system discussed above. Here, R1C1 represents row R = 1 and column C = 1. The same goes for the rest of the highlighted pixel positions. These pixel positions are all from odd positions. Pixel 51 comes from the odd position RC (3,1). The downsampling is shown in the last part of the above image as pixels 50, 51, 50, and 52.

3.2.2. Interpolation

The next step after the downsampling is interpolation. Interpolation generally means fitting data points onto something to represent data. In this method, interpolation refers to fitting pixels to represent the original image pixels and the downsampled pixels. To achieve this, each even pixel point position value is determined by computing the average of two fixed-position pixels from the downsampling. For instance, if the required even position is RC (1,2), the pixels from RC (1,1) and RC (1,3) are averaged and then rounded off to the nearest integer if the average is a floating-point number. The pixel at position RC (1,2) will have a value equal to this average. This can be carried out using Equation (10).
P i = d y + d y + 1 2
where Pi is the interpolated image pixels, d is the downsampled pixels, and y is the position of each downsampled pixel in terms of RC. Figure 5 is an example of how the interpolated pixels would look given the previous downsampling example:

3.2.3. Prediction Errors

To obtain the prediction errors Pe, the interpolated pixel values Pi for each pixel position are subtracted from the corresponding original pixels Po using Equation (11). Figure 6 shows an example of this. The yellow highlight marks the fixed pixel positions. The rest of the colors have no significant meaning apart from distinguishing between the original and interpolated pixels.
P e = P o P i

3.2.4. Adjusted Prediction Errors

To embed the secret message S, adjusted prediction errors Pa are used. The fixed prediction errors Pe are not used in the embedding, and as such, they are not adjusted; rather, they are directly copied as adjusted pixel errors Pa. The rest of the prediction errors are either shifted or used to embed the secret message by subtraction or addition using Equation (12):
P a =   P e     S ,     i f   P e     = 0 P e     + S ,     i f   P e     = 1 P e     + 3 ,     i f   P e     > 1 P e     3 ,     i f   P e     < 0            
where Pa is the adjusted prediction error, Pe is the prediction error, and S is the secret message bit. For this method, shifting is only performed by a maximum of 3 bits during embedding (for Pe = 1 and Pe = 0) and normal shifting (for Pe < 0 and Pe > 1). This causes some distortion, and, therefore, the PSNR of this method cannot be significantly high. However, it allows for more data to be embedded, hence improving the embedding capacity. Figure 7 is an example to demonstrate the above explanation. The change in Pe by +/−3 changes the pixel intensity, subsequently shifting the histogram of the original or stego image. The yellow highlight represents fixed pixel positions while the red font is the secret message to be hidden in the example in Figure 7.
In Figure 7, secret message S is 10110112. Using the above equation, the adjusted prediction errors can be found. The fixed pixel positions’ prediction errors will not be adjusted because they are fixed anyways and cannot be used to conceal the secret message. The positions with values less than 0 in the prediction errors Pe will be shifted left by 1, i.e., −1 will be shifted to −2. The positions with values greater than 1 in the prediction errors Pe will be shifted right by 1 to obtain the adjusted pixel prediction errors Pa, i.e., 2 will be shifted to 3. The positions with values equal to 1 in the prediction errors Pe will embed the secret message by adding the secret message bit to the prediction error Pe to obtain the adjusted pixel prediction errors, i.e., if the secret bit = 1 and the prediction error = 1, the adjusted pixel errors Pa will be 2.

3.2.5. Obtaining the Stego Image

The last stage in the embedding process is obtaining the stego image. To obtain the stego image, the adjusted pixel errors Pa are added at the corresponding position to the interpolated image pixels Pi at that position using Equation (13):
P s [ y ] = P a [ y ] + P i y
where PS is the stego image pixel and y is the position of the pixel or prediction errors. For example, PS [1] = Pa [1] + Pi [1]. Figure 8 is an example.
After this step is finished, the embedding process is complete. The sender can send the stego image and the compressed location map (as overhead information) to the receiver through a secure channel. Figure 8 is an embedding example where the yellow highlights represent the fixed pixel positions.

3.3. Extraction and Recovery

Upon receiving the stego image, the receiver has the capability to extract the concealed secrets and restore the image. The extraction and recovery procedures closely mirror the embedding process. The subsequent steps outline the process of secret extraction and image recovery:

3.3.1. Downsampling

Since the stego image’s fixed pixels and the original image’s pixels at the corresponding positions are equal, the same downsampling method can be used as in the extraction process. In this part, just like in the embedding process, the image has to be sampled using certain fixed pixel values. The selection of the fixed pixel values to be used during the downsampling process can be carried out in many different ways; however, the same method that was used for selecting the fixed pixel positions during embedding must be used in selecting the fixed pixel positions during the extraction process, since the fixed pixels are not modified. Following the proposed method of embedding process downsampling, odd pixel positions were selected as the fixed pixel positions from both the row R and the column C, using the same equation as in Section 3.2.1. Please note that both C and R must be odd if the pixel position is to be considered as a fixed pixel position. The selected fixed pixel position values are used as the downsampled pixels in the extraction process.

3.3.2. Interpolation

Since downsampling is the same as in the embedding process, the interpolation process in extraction and recovery also follows the same rules and steps as in the embedding process. To accomplish this, each even pixel point position value is found by calculating the average of two fixed position pixels from the downsampling. For instance, if the required even position is RC (1,2), the pixels from RC (1,1) and RC (1,3) are averaged and then rounded off to the nearest integer if the average is a floating-point number. The pixel at position RC (1,2) will have a value equal to this average. The extraction part of interpolation is carried out using Equation (10), as in the interpolation in the embedding process.

3.3.3. Prediction Errors

After interpolation has been completed, the next step is to calculate the prediction errors. To obtain the prediction errors Pe, the interpolated pixel values Pi for each pixel position are subtracted from the corresponding stego pixels Ps using Equation (14):
P e = P s P i  

3.3.4. Adjusted Prediction Errors

To extract the secret message S, predicted error Pe equals 0 or 1, with an exception: the fixed positions’ predicted errors will result in an S value that is equal to 0, while predicted errors with a −1 or 2 value will result in an S value that is equal to 1. Predicted errors with a −2 or 3 value and predicted errors with a −3 or 4 value will have S values of 2 and 3, respectively. Other predicted error values apart from those discussed will not have an S value, which means that there is no secret embedded at that position. To calculate the adjusted prediction errors Pa, the secret S is subtracted from the predicted errors Pe at each corresponding position, with Pe = 4, Pe = 3, Pe = 2, or Pe = 1. Further, the secret S is added to the predicted errors Pe at each corresponding position, with Pe = 0, Pe = −1, Pe = −2, or Pe = −3. To obtain the adjusted prediction errors for other values, 3 is subtracted from the predicted errors Pe at each corresponding position with Pe > 4, and the 3 is added to the predicted errors Pe at each corresponding position with Pe < −3. Equations (15) and (16) are used in this calculation:
S = 0 ,                   i f   P e     =     0   o r   1 1 ,                   i f   P e     = 1   o r   2 2 ,                   i f   P e = 2   o r         3 ,                   i f   P e = 3   o r   4   N A ,                   o t h e r w i s e    
P a = P e + S ,                     i f   P e     = 0     o r 1   o r 2   o r 3 P e S                       i f   P e     = 1   o r   2   o r   3   o r   4 P e 3 ,                     i f   P e     > 4 P e + 3 ,                     i f   P e     < 3
Finally, to recover the image, the interpolated pixels Pi are added to the adjusted prediction errors Pa. The image should be recovered in a lossless fashion. The image recovery is performed using Equation (17):
I r = P i + P a
where Ir is the recovered image pixel at each position. If any of the boundary pixels were adjusted from the location map, readjust the pixels to obtain the real cover image pixels. Figure 9 is an example of the whole secret message extraction and recovery process. The pixels with a yellow background are the fixed pixels. The same pixels are marked using a red circle to indicate that they are the pixels selected for down sampling purposes.

3.4. Generic Rivet Cipher 4(RC4 Encrption) Algorithm

The RC4 algorithm, also known as Rivest Cipher 4 or ARC4, is a symmetric stream cipher widely used for encryption in various security protocols. It is known for its simplicity and efficiency. RC4 generates a pseudo-random stream of bits, which is XORed with the plaintext to produce the ciphertext. The algorithm has three main steps: key scheduling, pseudo-random generation algorithm, and encryption.
  • Step 1. Key Scheduling:
    • Initialize an array S of 256 bytes with values from 0 to 255;
    • Create a key-dependent permutation of S using the Key Scheduling Algorithm (KSA);
    • The KSA involves iterating through each element of S, updating it based on the key and its position.
  • Step 2. Pseudo-Random Generation Algorithm (PRGA):
    • Initialize two pointers, i and j, both set to 0;
    • Use the PRGA to generate a stream of pseudo-random bytes;
    • In each iteration, update i and j, swap values in S, and calculate a pseudo-random value K from S;
    • Output K as part of the keystream.
  • Step 3. Encryption:
    • Input the plaintext message and the encryption key;
    • Initialize the internal state of RC4 using the key by performing the Key Scheduling step;
    • Generate a pseudo-random keystream using the PRGA;
    • XOR each byte of the plaintext with the corresponding byte from the keystream.
    • Output the resulting ciphertext;
    • Note that this algorithm does not influence the performance of the proposed method, but it is rather used to further protect secret data.

4. Experimental Results

The experiments for the proposed method were performed using Python 3.7 and Jupiter Notebook, running on a MacBook pro M1 with an Apple m1 chip and an 8GB RAM. For the sake of experimenting with this method, 10 images were adapted from USC-SIPI and used. All images used in the experiment were 512 × 512 pixels in size. The comparison was performed using the embedding capacity, the structural similarity index (SSIM), the peak signal-to-noise ratio (PSNR), and the prediction error histogram. The embedding capacity is a measure of how much data can be embedded into the cover image using the proposed method. In normal cases, a high embedding capacity results in a low PSNR value; however, this is not the case with the proposed method. The proposed method demonstrated a high embedding capacity average of 108,801.1 and an average PSNR value of 40.6 dB when considering the seven images in Table 1.
The peak signal-to-noise ratio (PSNR) serves as a quantitative metric for comparing images or signals. It is a mathematical equation that articulates the ratio between the power of a signal and the inherent distortion noise that could impact its quality representation. Typically, this expression is conveyed on the logarithmic decibel scale to prevent the representation of excessively large numbers.
In the context of images, the peak signal-to-noise ratio (PSNR) [13,14,15,16,17,18] is commonly employed to assess the distortion introduced in image steganography. A lower PSNR value indicates a more distorted image. For effective steganography algorithms, the PSNR value is expected to exceed 30 dB, as a value beyond this threshold implies that the distortion is imperceptible to the human eye. Additionally, a PSNR value greater than 30 dB is a common benchmark that signifies a good trade-off between the amount of hidden data and the perceptual quality of the stego image. The PSNR value is contingent upon the mean squared error (MSE), as illustrated in Equation (18).
P S N R = 10 · l o g 10 M A X 2 M S E  
where MAX is the maximum possible value. In the context of the proposed method, 8-bit grayscale images were employed, and consequently, the MAX value used was 255. The PSNR equation can be expressed as Equation (19).
P S N R = 10 · l o g 10 255 2 M S E    
The structural similarity index (SSIM) [17] is utilized for assessing the quality of stego images. A stego image with a value closer to 1 signifies higher image quality. The computation of SSIM can be performed using Equation (20).
S S I M = ( 2 p ¯ q + c 1   ) ( 2 σ p q + c 2 ) ( p ¯ 2 + q ¯ 2 + c 1   ) ( σ p 2 + σ q 2 + c 2 )      
where p, p ¯ 2 , σ p 2 and q, q ¯ 2 , σ q 2 represent the mean pixel number, variance, and the standard deviation of the original image and stego image, respectively. 2 σ p q is the covariance for the original and stego images. The symbols c 1   and c 2   are constants, where c 1    = k1L and c 2    = k2L. The value of k1 = 0.01, k2 = 0.03, and L is 255 [19].
The PSNR and SSIM are vital in measuring the performance of the algorithm. Both the structural similarity index (SSIM) and peak signal-to-noise ratio (PSNR) are metrics used to assess the quality of reconstructed signals or images, but they provide different insights. While PSNR focuses on the level of noise or distortion in the signal, SSIM takes into account structural information and human perception. Having both SSIM and PSNR values can offer a more comprehensive evaluation of the quality of a stego image.
Table 1 presents the experimental outcomes for select images utilized in the evaluation of the proposed methodology. The minimum peak signal-to-noise ratio (PSNR) value recorded was 40.1 dB, observed in the case of the baboon image. Conversely, the maximum PSNR value achieved was 40.8 dB. The mean PSNR value for the proposed method, considering the seven images delineated in Table 1, stood at 40.6 dB. Notably, the proposed method demonstrated an elevated embedding capacity, as evidenced in Table 1, with an average embedding capacity of 108,801 bits. Across our experiments, the range of embedding capacities varied from a minimum of 39,566 bits to a maximum of 146,170 bits.
Table 1 further demonstrates the SSIM value of the proposed method. As shown, the SSIM values for all the stego images were closer to 1, and therefore, as per the definition and description of the SSIM, the proposed method produced great stego images.
Some of the images (512 × 512) used in our experiments included a baboon, a boat, Lena, and an airplane, and these images are shown in Figure 10.
Table 2 is a comparison of the proposed method with other methods in terms of the PSNR with an embedding capacity of 10,000 bits. As can be seen, the proposed method could not outperform the other compared methods concerning the PSNR value; however, its PSNR value was above 30 dB, which can be recognized by the human eye. There is usually a trade-off between the embedding capacity and the PSNR. Since the proposed method improved the embedding capacity, it did not perform better than the compared methods with regard to the PSNR.
In the realm of data hiding, the embedding capacity (EC) denotes the quantitative extent to which information can be surreptitiously integrated within a host medium without perceptibly altering its intrinsic attributes. This crucial metric, intrinsic to the discipline of steganography, encapsulates the maximum volume of concealed data that can be seamlessly incorporated while mitigating discernible deviations in the quality or characteristics of the host medium, whether it be an image, audio file, video, or analogous data construct. The pursuit of an optimal embedding capacity resides in the delicate equilibrium between concealing a substantial quantum of information and minimizing any discernible impact, thereby ensuring that the covert alteration remains indiscernible to an observer. This, therefore, means that an increase in the embedding capacity (EC) leads to a decrease in the PSNR value. The embedding capacity, in this context, means the number of bits that can be hidden in the image. The embedding capacity was calculated based on Equation (21).
E C = 2 × ( n P e = 0 + n P e = 1 )
where n p e is the number of prediction errors.
Refs. [13,14,15,16,20,21] all describe reversible data-hiding methods in the histogram shifting and/or interpolation domains. All of these methods can produce very high PSNR values and high embedding capacities. Table 3 shows a comparison of the proposed method with these other previously proposed methods. HPPVO [13] has an average EC of 37,995 bits, OPPVO [14] has an average PSNR value of 30,555 bits, IPPVO [15] has an average EC of 33,723 bits, IPVO [16] has an average EC value of 32,218 bits, GS-LPVO [20] has an average EC value of 34,301, and LPVO [21] has an average EC value of 43,006, while the proposed method has a high EC of 101,283.5 bits. As can be seen, the proposed method has the highest average EC value when compared to these methods; thus, the proposed method is superior to the compared methods with regard to the embedding capacity. The airplane image, which usually has the highest EC in this domain, also shows that the proposed method still has the highest embedding capacity of 146,170 bits, as compared to 51,511 bits from [16], 60,054 bits from [15], 53,122 bits from [14], 62,273 bits from [13], 49,719 bits from [20], and 50,129 bits from [21] using the same image (airplane). The minimum EC that could be produced for all the methods was obtained for the baboon image, for which the proposed method still outperformed the aforementioned ones. The proposed method had an EC of 39 566 bits for this image, as can be seen in Table 3.
Figure 11 provides a visual representation of the performance of the proposed method at various embedding capacity (EC) values; the graph indicates that the method achieved high peak signal-to-noise ratio (PSNR) values for EC values below 20,000 bits, with a subsequent decline as EC increased. The house image, depicted in green, exhibited a particularly smooth quality, attaining an EC value exceeding 46 dB for EC values below 50,000 bits; however, a further increase in EC led to a 2 dB drop, resulting in a less smooth curve compared to other images.

4.1. Security

Information concealment techniques, such as the one proposed, facilitate the surreptitious transmission of sensitive data within ostensibly innocuous files. This covert methodology poses a formidable challenge for unauthorized entities attempting to detect or intercept the concealed information. A multitude of data-hiding algorithms have been devised across diverse domains, rendering it infeasible for hackers to ascertain the specific method employed for data concealment. Consequently, this complexity deters unauthorized access to the hidden confidential data, thereby fortifying the security of the information. Furthermore, information concealment frequently incorporates encryption, wherein data undergo transformation into an unreadable format without the requisite decryption key. This precaution ensures that, even if unauthorized individuals gain entry to the data, comprehension or utilization remains unattainable without the corresponding decryption key.
In the proposed methodology, for instance, the utilization of the RC4 algorithm can precede the embedding process, contributing to an additional layer of security. Moreover, in data concealment, the stego image typically closely resembles the original image, complicating the ability of hackers to differentiate between an image containing secret data and one that does not. Consequently, it can be asserted that the security of hidden data is substantially elevated. Rigorous assessments are commonly conducted on stego images to validate the algorithm’s resilience against potential attacks. If the algorithm demonstrates robustness in the face of such assessments, the proposed methodology can be deemed secure. One such attack is the rotation attack.
In steganography, a rotation attack [19] refers to a technique used by adversaries to detect, manipulate, or uncover hidden information within images or other media. This attack involves rotating the carrier medium, typically an image, to reveal patterns or inconsistencies that might indicate the presence of concealed data. Attackers may employ rotation to achieve goals such as detecting hidden information, extracting it, or disrupting it. To counter rotation attacks and enhance steganography security, advanced techniques are used that can withstand rotations and other transformations while maintaining the integrity of the hidden data. Rotations by 0, 45, 135, 90, 180, 30, and 270 degrees were applied to the images. Usually, when a rotation attack can be detected, the PSNR of the images is significantly reduced; however, the proposed method can withstand this kind of attack because the PSNR values produced are not too different from each other as shown in Figure 12.

4.2. Additional Information

It should be noted that the original binary secret denoted SLai is first encrypted using RC4 encryption or simple XOR (⊕) to form a new binary secret, denoted as SHui. Before the embedding process, SHui is divided into groups of 2 to create the to-be-embedded secret S using Equation (22). The final secret after extraction is the decrypted secret SLai. The implementation of RC4 encryption has not been added to this paper.
s = 0 ,     i f   s b = 00 1 ,     i f   s b = 01 2 ,     i f   s b = 10 3 ,     i f   s b = 11

5. Conclusions

In this research endeavor, a method founded upon EMNI [11] was introduced, employing a capacity-enhancing interpolation and histogram-shifting technique. The original image underwent a reduction in size, followed by interpolation to generate novel pixels. Subsequently, prediction errors were computed, and these errors underwent adjustments to integrate the covert message, resulting in the production of the stego image. This approach, surpassing contemporary techniques such as IPPVO and IPVO, exhibited an augmented embedding capacity. The proposed method yielded a superior average embedding capacity of 101,283.5 bits across the four images employed in the comparative analysis. Furthermore, the suggested method was characterized by reversibility. Notably, its security was fortified against rotation attacks, employing RC4 encryption on the secret message before integration. The applicability of this method extends to domains requiring the transmission of substantial data, such as the medical field.
In forthcoming investigations, efforts to enhance the peak signal-to-noise ratio (PSNR) value merit exploration. Additionally, fortification of the proposed method’s security can be achieved through the incorporation of image encryption techniques.

Author Contributions

Conceptualization, C.-Y.W.; Methodology, C.-Y.W.; Validation, C.-Y.W., H.-Y.W., N.S.S. and C.-T.H.; Formal analysis, C.-Y.W., H.-Y.W. and C.-T.H.; Writing—original draft, N.S.S.; Writing—review & editing, C.-T.H.; Supervision, C.-T.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST110-2218-E-218-001- and Yuan Ze-Far Eastern Memorial Hospital Project (112-150008-14).

Data Availability Statement

The images utilized in this research are accessible to the public via the following link: https://sipi.usc.edu/database/, accessed on 21 December 2023. Other additional data are contained within the article. If need be further data can be shared upon request.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have influenced the work reported in this paper.

References

  1. Alassaf, N.; Gutub, A.; Parah, S.A.; Al Ghamdi, M. Enhancing the speed of SIMON: A light-weight cryptographic algorithm for IoT applications. Multimed. Tools Appl. 2019, 78, 32633–32657. [Google Scholar] [CrossRef]
  2. Liao, X.; Li, K.; Yin, J. Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed. Tools Appl. 2017, 76, 20739–20753. [Google Scholar] [CrossRef]
  3. Al-Juaid, N.; Gutub, A. Combining RSA and audio steganography on personal computers for enhancing security. SN Appl. Sci. 2019, 1, 830. [Google Scholar] [CrossRef]
  4. Cryptography Definition. Available online: https://www.kaspersky.com/resource-center/definitions/what-is-cryptography (accessed on 2 August 2021).
  5. What is Steganography. Available online: https://searchsecurity.techtarget.com/definition/steganography (accessed on 2 August 2021).
  6. Wang, J.; Ni, J.; Zhang, X.; Shi, Y.Q. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybern. 2017, 47, 315–326. [Google Scholar] [CrossRef]
  7. Hsiao, J.; Yuan, C.; Lin, Z.Y.; Chen, P.Y. Reversible data hiding based on the pairwise prediction-error histogram. J. Inf. Sci. Eng. 2017, 33, 289–304. [Google Scholar]
  8. Fan, M.; Zhong, S.; Xiong, X. Reversible Data Hiding Method for Interpolated Images Based on Modulo Operation and Prediction-Error Expansion. IEEE Access 2023, 11, 27290–27302. [Google Scholar] [CrossRef]
  9. Thodi, D.M.; Rodriguez, J.J. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 2007, 16, 721–730. [Google Scholar] [CrossRef]
  10. Qu, X.; Kim, H. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 2015, 111, 249–260. [Google Scholar] [CrossRef]
  11. Chang, Y.T.; Huang, C.T.; Lee, C.F.; Wang, S.J. Image interpolating based data hiding in conjunction with pixel-shifting of the histogram. J. Supercomput. 2013, 66, 1093–1110. [Google Scholar] [CrossRef]
  12. Lee, C.F.; Huang, Y.L. An efficient image interpolation increasing payload in reversible data hiding. Expert. Syst. Appl. 2012, 39, 6712–6719. [Google Scholar] [CrossRef]
  13. Xiang, H.; Yuan, J.; Hou, S. Hybrid predictor, and field-biased context pixel selection based on PPVO. Math. Probl. Eng. 2016, 2016, 2585983. [Google Scholar] [CrossRef]
  14. Weng, S.; Zhang, G.; Pan, J.; Zhou, Z. Optimal PPVO based reversible data hiding. J. Vis. Commun. Image Represent. 2017, 48, 317–328. [Google Scholar] [CrossRef]
  15. Wu, H.; Li, X.; Zhao, Y. Improved PPVO-based high-fidelity reversible data hiding. Signal Process. 2020, 167, 107264. [Google Scholar] [CrossRef]
  16. Peng, F.; Li, X.; Yang, B. Improved PVO-based reversible data hiding. Digit. Signal Process. 2014, 25, 255–265. [Google Scholar] [CrossRef]
  17. Lin, C.-C.; Chang, C.-C.; Kao, W.-J.; Chang, J.-F. Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images. IEEE Access 2022, 10, 18470–18485. [Google Scholar] [CrossRef]
  18. Lin, J.; Weng, S.; Zhang, T.; Ou, B.; Chang, C.-C. Two-Layer Reversible Data Hiding Based on AMBTC Image with (7, 4) Hamming Code. IEEE Access 2020, 8, 21534–21548. [Google Scholar] [CrossRef]
  19. Li, S.; Hu, L.; Sun, C.; Chi, L.; Li, T.; Li, H. A Reversible Data Hiding Algorithm Based on Prediction Error with Large Amounts of Data Hiding in Spatial Domain. IEEE Access 2020, 8, 214732–214741. [Google Scholar] [CrossRef]
  20. Wu, Y.; Hu, R.; Xiang, S. PVO-Based Reversible Data Hiding Using Global Sorting and Fixed 2D Mapping Modification. IEEE Trans. Circuits Syst. Video Technol. 2024, 34, 618–631. [Google Scholar] [CrossRef]
  21. Zhang, T.; Li, X.; Qi, W.; Guo, Z. Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2306–2319. [Google Scholar] [CrossRef]
Figure 1. The GAP prediction method.
Figure 1. The GAP prediction method.
Electronics 13 00738 g001
Figure 2. ENMI examples.
Figure 2. ENMI examples.
Electronics 13 00738 g002
Figure 3. Proposed method framework.
Figure 3. Proposed method framework.
Electronics 13 00738 g003
Figure 4. Downsampling example.
Figure 4. Downsampling example.
Electronics 13 00738 g004
Figure 5. Interpolation example.
Figure 5. Interpolation example.
Electronics 13 00738 g005
Figure 6. Prediction error calculation example.
Figure 6. Prediction error calculation example.
Electronics 13 00738 g006
Figure 7. Adjusted prediction error calculation example.
Figure 7. Adjusted prediction error calculation example.
Electronics 13 00738 g007
Figure 8. Embedding example.
Figure 8. Embedding example.
Electronics 13 00738 g008
Figure 9. Extraction and recovery procedure example.
Figure 9. Extraction and recovery procedure example.
Electronics 13 00738 g009
Figure 10. 512 × 512 images used in the experiment.
Figure 10. 512 × 512 images used in the experiment.
Electronics 13 00738 g010
Figure 11. Performance curve of the proposed method with different EC values.
Figure 11. Performance curve of the proposed method with different EC values.
Electronics 13 00738 g011
Figure 12. Rotation attack on the proposed method.
Figure 12. Rotation attack on the proposed method.
Electronics 13 00738 g012
Table 1. Results of the proposed method using the maximum embedding capacity.
Table 1. Results of the proposed method using the maximum embedding capacity.
512 × 512PSNRECSSIM
Lena40.7124,0540.96
Airplane 40.8146,1700.97
Peppers40.6113,0560.95
Jet40.9124,1920.99
Boat40.595,3440.93
House40.6119,2260.95
Baboon40.139,5660.92
Average40.6108,801.10.95
Table 2. PSNR (dB) comparison of the proposed method with other methods at 10,000 bits EC.
Table 2. PSNR (dB) comparison of the proposed method with other methods at 10,000 bits EC.
ImagesHPPVO
[13]
OPPVO
[14]
IPPVO
[15]
IPVO
[16]
GS-LPVO
[20]
LPVO
[21]
Proposed
Lena60.3460.8361.1460.4962.8662.056.05
Airplane63.7862.9364.0962.9964.4465.051.62
Boat58.459.0858.8358.459.69N/A52.56
Baboon54.0255.0754.7553.6956.3762.545.01
Average59.1359.4759.7058.8960.6963.251.31
Table 3. EC comparison of the proposed method with other methods in bits.
Table 3. EC comparison of the proposed method with other methods in bits.
ImagesHPPVO
[13]
OPPVO
[14]
IPPVO
[15]
IPVO
[16]
GS-LPVO
[20]
LPVO
[21]
Proposed
Lena45,90634,07136,64337,66745,19643,645124,054
Airplane62,27353,12260,05451,51149,71950,129146,170
Boat29,69323,75925,78226,31529,188N/A95,344
Baboon14,10911,26912,41613,38113,09935,24539,566
Average37,995.330,555.333,723.832,218.534,30143,006101,283.5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Weng, C.-Y.; Weng, H.-Y.; Shongwe, N.S.; Huang, C.-T. High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting. Electronics 2024, 13, 738. https://doi.org/10.3390/electronics13040738

AMA Style

Weng C-Y, Weng H-Y, Shongwe NS, Huang C-T. High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting. Electronics. 2024; 13(4):738. https://doi.org/10.3390/electronics13040738

Chicago/Turabian Style

Weng, Chi-Yao, Hao-Yu Weng, Njabulo Sinethemba Shongwe, and Cheng-Ta Huang. 2024. "High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting" Electronics 13, no. 4: 738. https://doi.org/10.3390/electronics13040738

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop