Skip to main content

A Novel Data Hiding Technique with High Imperceptibility Using a 3-Input Majority Function and an Optimal Pixel Adjustment

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Data Engineering (AIDE 2019)

Abstract

Maximizing the payload capacity without losing the visual quality of the original image is a challenging problem in stegnography. This paper puts forth a data hiding technique with high imperceptibility and utilize the scope of a 3-input majority (MAJ3) function. Generally, a majority function takes an odd number of inputs and returns the majority value as its output. If the output of the majority function and the secret bits we want to hide are different, then we have defined an optimal pixel adjustment so that the receiver can extract the obscure data back. Empirical results unfold that this recommended approach increased the embedding capacity without comprising the visual quality. Complexity of the proposed algorithm is less compared to other image-based data hiding algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rasmi A, Mohanapriya M (2017) An extensive survey of data hiding techniques. Eur J Appl Sci 9(3):133–139

    Google Scholar 

  2. Shaik A, Thanikaiselvan V, Amitharajan R (2017) Data security through data hiding in images: a review. J Artif Intell 10:1–21

    Google Scholar 

  3. Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Sig Process Image Commun 29:375–384

    Google Scholar 

  4. Pradan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng. https://doi.org/10.1155/2018/1804953

  5. Lin C-C, Shiu P-F (2010) DCT-based reversible data hiding scheme. J Softw 5(2)

    Google Scholar 

  6. Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z (2004) Reversible data hiding using integer wavelet transform and companding technique. Lecture notes in computer science. Springer, pp 115–124

    Google Scholar 

  7. Amin M, Abdullkader HM, Ibrahem HM, Sakr AS (2014) A steganographic method based on DCT and new quantization technique. Int J Netw Secur 16(4):265–270

    Google Scholar 

  8. Maleki N, Jalali M, Jahan MV (2014) Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Egypt Inform J 15:115–127

    Google Scholar 

  9. Bassil Y (2012) Image steganography based on a parameterized canny edge detection algorithm. Int J Comput Appl 64(4):35–40

    Google Scholar 

  10. Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93–99

    Google Scholar 

  11. Vanmathi C, Prabhu S (2017) Image stegnography using fuzzy logic and chaotic for large payload and high imperceptibility. Int J Fuzzy Syst 20(2):460–473

    Google Scholar 

  12. Khamuri A, Mandal JK (2013) A genetic algorithm based stegnography using discrete cosine transformation. In: International conference on computational intelligence: modeling techniques and applications, Procedia Technology, vol 10, pp 105–111

    Google Scholar 

  13. Zhang X, Wang X (2017) High capacity data hiding based on interpolated image. Multimedia Tools Appl 76(7):9195–9218

    Google Scholar 

  14. Kaw J, Parah S, Sheikh J, Bhat M (2017) A new reversible stenographic technique based on pixel repetition method (PRM) and special data shifting (SDS). In: International conference on image information processing. https://doi.org/10.1109/iciip.2017.8313710

  15. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Google Scholar 

  16. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Sig Process Lett 9:81–84

    Google Scholar 

  17. Parah S, Sheikh J, Akhoon J, Loan N (2018) Electronic Health record hiding in images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Future generation computer systems. Elsevier

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. V. Sabeen Govind .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sabeen Govind, P.V., Shiju Thomas, M.Y., Judy, M.V. (2021). A Novel Data Hiding Technique with High Imperceptibility Using a 3-Input Majority Function and an Optimal Pixel Adjustment. In: Chiplunkar, N.N., Fukao, T. (eds) Advances in Artificial Intelligence and Data Engineering. AIDE 2019. Advances in Intelligent Systems and Computing, vol 1133. Springer, Singapore. https://doi.org/10.1007/978-981-15-3514-7_64

Download citation

Publish with us

Policies and ethics