Skip to main content
Log in

A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD

  • Original Paper
  • Published:
Machine Vision and Applications Aims and scope Submit manuscript

Abstract

Aiming at the problem of the security of secret information in various potential applications, we introduce a robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition (SVD). Firstly, the carrier and secret mark information is transformed by NSCT-HD-SVD. Secondly, the singular score of secret media information is concealed in the carrier image. Thirdly, the text document is further concealed in the carrier marked image via pseudo magic cubes to achieve the final carrier marked image. Finally, the lossless encryption scheme is utilized to encrypt the final marked image. The simulation results of the proposed algorithm indicate good invisibility and robustness effect compared to existing schemes with high security and hiding efficiency. It indicates a considerable improvement in robustness of up to 96.36% over other schemes. Overall, the proposed algorithm for various images, achieved peak signal-to-noise ratio (PSNR), normalized correlation (NC), structural similarity index (SSIM), number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI) of up to 67.36 dB, 0.9996, 1.0000, 0.9964 and 0.4005, respectively, indicating its effectiveness for secure media applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Mahato, S., Yadav, D., Khan, D.: A novel information hiding scheme based on social networking site viewers’ public comments. J. Inf. Secur. Appl. 47, 275–283 (2019)

    Google Scholar 

  2. Singh, A.K., Kumar, B., Singh, G., Mohan, A.: Digital Image Watermarking: Concepts and Applications. In: Singh, A., Kumar, B., Singh, G., Mohan, A. (eds) Medical Image Watermarking. Multimedia Systems and Applications. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57699-2_1

  3. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A Privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  4. Singh, A.K.: Data Hiding: Current Trends, Innovation and Potential Challenges. ACM Trans. Multimed. Comput. Commun. Appl. 16(3s), 1–16 (2021)

    Article  Google Scholar 

  5. Singh, O.P., Singh, A. K., Srivastava, G., Kumar, N.: Image watermarking using soft computing techniques: A comprehensive survey. Multimed. Tools Appl., pp. 1–32, 2020.

  6. Mohanty, S., Sengupta, A., Guturu, P., Kougianos, E.: Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum. Electr. Mag. 6(3), 83–91 (2017)

    Article  Google Scholar 

  7. Yuan, Z., Su, Q., Liu, D., Zhang, X.: A blind image watermarking scheme combining spatial domain and frequency domain. Vis. Comput. 37, 1867–1881 (2021)

    Article  Google Scholar 

  8. Nam, S., Mun, S., Ahn, W., Kim, D., In, Yu., Kim, W., Lee, H.: NSCT-based robust and perceptual watermarking for DIBR 3D images. IEEE Access 8, 93760–93781 (2020)

    Article  Google Scholar 

  9. Liu, J., Huang, J., Luo, Y., Cao, L., Yang, S., Wei, D., Zhou, R.: An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7, 80849–80860 (2019)

    Article  Google Scholar 

  10. Ranjani, J., Zaid, F.: Pseudo magic cubes: a multidimensional data hiding scheme exploiting modification directions for large payloads. Comput. Electr. Eng. 89, 1–10 (2021)

    Article  Google Scholar 

  11. Zefreh, E.: An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 79(33–34), 24993–25022 (2020)

    Article  Google Scholar 

  12. M. Kazemi, M. Pourmina and A. Mazinan, "Novel Neural Network Based CT-NSCT Watermarking Framework Based upon Kurtosis Coefficients", Sensing and Imaging, vol. 21, no. 1, 2019.

  13. Thakur, S., Singh, A., Ghrera, S., Mohan, A.: Chaotic based secure watermarking approach for medical images. Multimed. Tools Appl. 79(7–8), 4263–4276 (2018)

    Google Scholar 

  14. A. Amiri and S. Mirzakuchaki, "A digital watermarking method based on NSCT transform and hybrid evolutionary algorithms with neural networks", SN Applied Sciences, vol. 2, no. 10, 2020.

  15. Li, J., Zhang, C.: Blind watermarking scheme based on Schur decomposition and non-subsampled contourlet transform. Multimed. Tools Appl. 79(39–40), 30007–30021 (2020)

    Article  Google Scholar 

  16. Su, Q., Wang, G., Lv, G., Zhang, X., Deng, G., Chen, B.: A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. Multimed. Tools Appl. 76(6), 8781–8801 (2016)

    Article  Google Scholar 

  17. Singh, A.K., Thakur, S., Jolfaei, A., Srivastava, G., Elhoseny, M., Mohan, A.: Joint encryption and compression-based watermarking technique for security of digital documents. ACM Trans. Internet Technol. 21(1), 1–20 (2021)

    Article  Google Scholar 

  18. Kumar, C., Singh, A.K., Kumar, P., Singh, R., Singh, S.: SPIHT - based multiple image watermarking in NSCT domain. Concurrency and Computation: Practice and Experience 32(1) (2018)

  19. Nam, S., Mun, S., Kim, D., Ahn, W., Yu, I., Kim, W., Lee, H., et al.: NSCT-based robust and perceptual watermarking for DIBR 3D images. IEEE Access 8, 93760–93781 (2020)

    Article  Google Scholar 

  20. P. S. and C. P. V. S. S. R., "A robust semi-blind watermarking for color images based on multiple decompositions", Multimedia Tools and Applications, vol. 76, no. 24, pp. 25623–25656, 2017.

  21. Luo, Y., Li, L., Liu, J., Tang, S., Zhang, S., Qiu, S., Cao, Y.: A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Systems with Applications 168, 114272 (2021)

    Article  Google Scholar 

  22. http://sipi.usc.edu/database/database.php?volume=misc

  23. Anand, A., Singh, A. K.: An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 152, 72–80 (2020)

    Article  Google Scholar 

  24. Anand, A., Singh, A.K., Lv, Z., Bhatnagar, G.: Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE Multimed. 27(4), 133–143 (2020)

    Article  Google Scholar 

  25. Thakur, S., Singh, A. K., Kumar, B., Ghrera, S.P.: Improved DWTSVD-Based Medical Image Watermarking Through Hamming Code and Chaotic Encryption. Lecture Notes in Electrical Engineering, pp. 897–905 (2019)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. K. Singh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, O.P., Singh, A.K. A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Machine Vision and Applications 32, 101 (2021). https://doi.org/10.1007/s00138-021-01227-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00138-021-01227-0

Keywords

Navigation