Skip to main content
Log in

Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system

  • Original Research Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Robust data hiding methods are basically used when rightful ownership is intended and/or transmitting channel is prone to noise. In this paper, a robust and secure data hiding method is proposed in Tchebichef domain. For feature extraction, remainders of Tchebichef coefficients are calculated according to Chinese remainder theorem (CRT). Distances of these remainders are utilized as the extracted features. These distances are then modified according to the hidden bits, to complete the embedding process. To reduce the chance of illegal access and increase the security of the proposed method, a closed-loop chaotic encryption system (CLCES) has been introduced. The proposed CLCES requires very little side information and produces extremely sensitive noise-like sequences with high security. Robustness and security of the proposed method have been analyzed. Comparison results with other related methods in the current literature confirm the superiority of the proposed method. Due to its simplicity, the proposed method is a good candidate for real-time data hiding applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Emeras, J., Varrette, S., Plugaru, V., Bouvry, P.: Amazon elastic compute cloud (EC2) versus in-house hpc platform: A cost analysis. IEEE Trans. Cloud Comput. 7, 456–468 (2019)

    Article  Google Scholar 

  2. Chang, C.C., Liu, Y., Chen, K.J.: Real-time adaptive visual secret sharing with reversibility and high capacity. J. Real-Time Image Process. 16, 871–881 (2019)

    Article  Google Scholar 

  3. Bolourian Haghighi, B., Taherinia, A.H., Mohajerzadeh, A.H.: TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf. Sci. 486, 204–230 (2019)

    Article  Google Scholar 

  4. Ge, H., Sha, J.: FPGA-based low-complexity high-throughput real-time hardware accelerator for robust watermarking. J. Real-Time Image Process. 16, 813–820 (2019)

    Article  Google Scholar 

  5. Bae, S., Kim, J., Kim, M.: HEVC-based perceptually adaptive video coding using a DCT-based local distortion detection probability model. IEEE Trans. Image Process. 25, 3343–3357 (2016)

    Article  MathSciNet  Google Scholar 

  6. Dongdong, H., Haoqian, W., Weiming, Z., Nenghai, Y.: Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 148, 41–47 (2018)

    Article  Google Scholar 

  7. Sahar, A.E.R.: A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput. Electr. Eng. 70, 380–399 (2018)

    Article  Google Scholar 

  8. Reem, A.A., Lamiaa, A.E.: Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl. Comput. Inform. 15, 191–202 (2019)

    Article  Google Scholar 

  9. Arunkumar, S., Subramaniyaswamy, V., Vijayakumar, V., Chilamkurti, N., Logesh, R.: SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139, 426–437 (2019)

    Article  Google Scholar 

  10. Moosazadeh, M., Ekbatanifard, Gh: A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 47, 28–38 (2019)

    Google Scholar 

  11. Abdelhakim, A.M., Saleh, H.I., Nassar, A.M.: Quality metric-based fitness function for robust watermarking optimisation with Bees algorithm. IET Image Process. 10, 247–252 (2016)

    Article  Google Scholar 

  12. Ernawan, F., Kabir, M.N.: A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464–20480 (2018)

    Article  Google Scholar 

  13. Loan, N.A., Hurrah, N.N., Parah, S.A., Lee, J.W., Sheikh, J.A., Bhat, G.M.: Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6, 19876–19897 (2018)

    Article  Google Scholar 

  14. Hua, Z., Hu, L.: A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process. Image Commun. 78, 331–344 (2019)

    Article  Google Scholar 

  15. Elshoura, S.M., Megherbi, D.B.: A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Signal Process. Image Commun. 28, 531–552 (2013)

    Article  Google Scholar 

  16. Oliveira, P.A.M., Cintra, R.J., Bayer, F.M., Kulasekera, S., Madanayake, A.: Low-complexity image and video coding based on an approximate discrete tchebichef transform. IEEE Trans. Circuits Syst. Video Technol 27, 1066–1076 (2017)

    Article  Google Scholar 

  17. Bin, X., Gang, L., Yanhong, Z., Weisheng, L., Guoyin, W.: Lossless image compression based on integer Discrete Tchebichef Transform. Neurocomputing 214, 587–593 (2016)

    Article  Google Scholar 

  18. Nasred din, K., Khaoula, M., Saliha, H., Noureddine, D.: Region-of-interest based image compression using the discrete Tchebichef transform in wireless visual sensor networks. Comput. Electr. Eng. 73, 194–208 (2019)

    Article  Google Scholar 

  19. Khalid, M.H., Asmaa, M.K., Ehab, R.M.: Efficient compression of bio-signals by using Tchebichef moments and Artificial Bee Colony. Biocybernet. Biomed. Eng. 38, 385–398 (2018)

    Article  Google Scholar 

  20. Nasreddine, K., Khaoula, M., Djemil, M., Noureddine, D.: Pruned discrete Tchebichef transform for image coding in wireless multimedia sensor networks. AEU Int. J. Electron. Commun. 74, 123–127 (2017)

    Article  Google Scholar 

  21. Kiruba, M., Sumathy, V.: Register pre-allocation based folded discrete Tchebichef transformation technique for image compression. Integration 60, 13–24 (2018)

    Article  Google Scholar 

  22. Cheng, D., Xinbo, G., Xuelong, L., Dacheng, T.: A local Tchebichef moments-based robust image watermarking. Signal Process. 89, 1531–1539 (2009)

    Article  Google Scholar 

  23. Keju, M., Fuyou, M., Wenchao, H., Yan, X.: Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem. Discret. Appl. Math. 168, 152–163 (2019)

    MathSciNet  MATH  Google Scholar 

  24. Xiao, H., Huang, Y., Ye, Y., Xiao, G.: Robustness in Chinese Remainder theorem for multiple numbers and remainder coding. IEEE Trans. Signal Process. 66, 4347–4361 (2018)

    Article  MathSciNet  Google Scholar 

  25. Chengqing, L., Yuansheng, L., Leo, Y.Z., Kwok-Wo, W.: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29, 914–920 (2014)

    Article  Google Scholar 

  26. Stéphane Gael, R.E., René, N.: PDF steganography based on Chinese Remainder Theorem. J. Inf. Secur. Appl. 29, 1–15 (2016)

    Google Scholar 

  27. Maroti, D., Neeta, N., Mushtaq, Ahmed: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Visual Commun. Image Represent. 49, 291–302 (2017)

    Article  Google Scholar 

  28. Silva, B., Fraidenraich, G.: Performance analysis of the classic and robust Chinese remainder theorems in pulsed Doppler radars. IEEE Trans. Signal Process. 66, 4898–4903 (2018)

    Article  MathSciNet  Google Scholar 

  29. Rushi, L., Jinwen, H., Shouhua, W., Tianlong, G., Xiaonan, L.: Integrated chaotic systems for image encryption. Signal Process. 147, 133–145 (2018)

    Article  Google Scholar 

  30. Yicong, Z., Long, B., Philip Chen, C.L.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Article  Google Scholar 

  31. Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forens. Secur. 13, 1670–1681 (2018)

    Article  Google Scholar 

  32. Break Our Watermarking System, 2nd ed (BOWS 2). http://bows2.ec-lille.fr/ (2007)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Habibollah Danyali.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghaemi, A., Danyali, H. & Kazemi, K. Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system. J Real-Time Image Proc 18, 221–232 (2021). https://doi.org/10.1007/s11554-020-00971-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-020-00971-2

Keywords

Navigation