Abstract
Robust data hiding methods are basically used when rightful ownership is intended and/or transmitting channel is prone to noise. In this paper, a robust and secure data hiding method is proposed in Tchebichef domain. For feature extraction, remainders of Tchebichef coefficients are calculated according to Chinese remainder theorem (CRT). Distances of these remainders are utilized as the extracted features. These distances are then modified according to the hidden bits, to complete the embedding process. To reduce the chance of illegal access and increase the security of the proposed method, a closed-loop chaotic encryption system (CLCES) has been introduced. The proposed CLCES requires very little side information and produces extremely sensitive noise-like sequences with high security. Robustness and security of the proposed method have been analyzed. Comparison results with other related methods in the current literature confirm the superiority of the proposed method. Due to its simplicity, the proposed method is a good candidate for real-time data hiding applications.
Similar content being viewed by others
References
Emeras, J., Varrette, S., Plugaru, V., Bouvry, P.: Amazon elastic compute cloud (EC2) versus in-house hpc platform: A cost analysis. IEEE Trans. Cloud Comput. 7, 456–468 (2019)
Chang, C.C., Liu, Y., Chen, K.J.: Real-time adaptive visual secret sharing with reversibility and high capacity. J. Real-Time Image Process. 16, 871–881 (2019)
Bolourian Haghighi, B., Taherinia, A.H., Mohajerzadeh, A.H.: TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf. Sci. 486, 204–230 (2019)
Ge, H., Sha, J.: FPGA-based low-complexity high-throughput real-time hardware accelerator for robust watermarking. J. Real-Time Image Process. 16, 813–820 (2019)
Bae, S., Kim, J., Kim, M.: HEVC-based perceptually adaptive video coding using a DCT-based local distortion detection probability model. IEEE Trans. Image Process. 25, 3343–3357 (2016)
Dongdong, H., Haoqian, W., Weiming, Z., Nenghai, Y.: Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 148, 41–47 (2018)
Sahar, A.E.R.: A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput. Electr. Eng. 70, 380–399 (2018)
Reem, A.A., Lamiaa, A.E.: Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl. Comput. Inform. 15, 191–202 (2019)
Arunkumar, S., Subramaniyaswamy, V., Vijayakumar, V., Chilamkurti, N., Logesh, R.: SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139, 426–437 (2019)
Moosazadeh, M., Ekbatanifard, Gh: A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 47, 28–38 (2019)
Abdelhakim, A.M., Saleh, H.I., Nassar, A.M.: Quality metric-based fitness function for robust watermarking optimisation with Bees algorithm. IET Image Process. 10, 247–252 (2016)
Ernawan, F., Kabir, M.N.: A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464–20480 (2018)
Loan, N.A., Hurrah, N.N., Parah, S.A., Lee, J.W., Sheikh, J.A., Bhat, G.M.: Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6, 19876–19897 (2018)
Hua, Z., Hu, L.: A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process. Image Commun. 78, 331–344 (2019)
Elshoura, S.M., Megherbi, D.B.: A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Signal Process. Image Commun. 28, 531–552 (2013)
Oliveira, P.A.M., Cintra, R.J., Bayer, F.M., Kulasekera, S., Madanayake, A.: Low-complexity image and video coding based on an approximate discrete tchebichef transform. IEEE Trans. Circuits Syst. Video Technol 27, 1066–1076 (2017)
Bin, X., Gang, L., Yanhong, Z., Weisheng, L., Guoyin, W.: Lossless image compression based on integer Discrete Tchebichef Transform. Neurocomputing 214, 587–593 (2016)
Nasred din, K., Khaoula, M., Saliha, H., Noureddine, D.: Region-of-interest based image compression using the discrete Tchebichef transform in wireless visual sensor networks. Comput. Electr. Eng. 73, 194–208 (2019)
Khalid, M.H., Asmaa, M.K., Ehab, R.M.: Efficient compression of bio-signals by using Tchebichef moments and Artificial Bee Colony. Biocybernet. Biomed. Eng. 38, 385–398 (2018)
Nasreddine, K., Khaoula, M., Djemil, M., Noureddine, D.: Pruned discrete Tchebichef transform for image coding in wireless multimedia sensor networks. AEU Int. J. Electron. Commun. 74, 123–127 (2017)
Kiruba, M., Sumathy, V.: Register pre-allocation based folded discrete Tchebichef transformation technique for image compression. Integration 60, 13–24 (2018)
Cheng, D., Xinbo, G., Xuelong, L., Dacheng, T.: A local Tchebichef moments-based robust image watermarking. Signal Process. 89, 1531–1539 (2009)
Keju, M., Fuyou, M., Wenchao, H., Yan, X.: Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem. Discret. Appl. Math. 168, 152–163 (2019)
Xiao, H., Huang, Y., Ye, Y., Xiao, G.: Robustness in Chinese Remainder theorem for multiple numbers and remainder coding. IEEE Trans. Signal Process. 66, 4347–4361 (2018)
Chengqing, L., Yuansheng, L., Leo, Y.Z., Kwok-Wo, W.: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29, 914–920 (2014)
Stéphane Gael, R.E., René, N.: PDF steganography based on Chinese Remainder Theorem. J. Inf. Secur. Appl. 29, 1–15 (2016)
Maroti, D., Neeta, N., Mushtaq, Ahmed: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Visual Commun. Image Represent. 49, 291–302 (2017)
Silva, B., Fraidenraich, G.: Performance analysis of the classic and robust Chinese remainder theorems in pulsed Doppler radars. IEEE Trans. Signal Process. 66, 4898–4903 (2018)
Rushi, L., Jinwen, H., Shouhua, W., Tianlong, G., Xiaonan, L.: Integrated chaotic systems for image encryption. Signal Process. 147, 133–145 (2018)
Yicong, Z., Long, B., Philip Chen, C.L.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)
Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forens. Secur. 13, 1670–1681 (2018)
Break Our Watermarking System, 2nd ed (BOWS 2). http://bows2.ec-lille.fr/ (2007)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ghaemi, A., Danyali, H. & Kazemi, K. Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system. J Real-Time Image Proc 18, 221–232 (2021). https://doi.org/10.1007/s11554-020-00971-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-020-00971-2