An efficient and adaptive data-hiding scheme based on secure random matrix

Autoři: Mingwu Zhang aff001;  Shaochen Zhang aff001;  Lein Harn aff003
Působiště autorů: School of Computer Sciences, Hubei University of Technology, Wuhan, Hubei Province, China aff001;  Hubei Key Laboratory of Intelligent Geo-Information Processing, China University of Geosciences, Wuhan, Hubei Province, China aff002;  Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, State of Missouri, United States of America aff003
Vyšlo v časopise: PLoS ONE 14(10)
Kategorie: Research Article


There is a vivid research on securely deliver a secret message by using a data hiding technique in digital images. However, most existing solutions of data-hiding need to encrypt secret data first, and embed the encrypt message into cover image, which is not promising any security once the embedding algorithm is leaked. In this paper, an efficient and adaptive data hiding scheme is presented which is based on a new reference matrix named secure reference matrix. The scheme is flexible enough to meet different data hiding capacities and image quality as needed, and we allow the reference matrix to be more secure since it is randomly generated each time and make it much harder for being attack with exhaustive manner by extending the possible solution. We give the detail protocol for our scheme and provide the practical test and performance analysis. Experimental results show that our scheme has a better flexibility and efficiency in embedding process, and the average value of Peak Signal to Noise Ratio (PSNR) for the stego-images which are generated by our scheme have a higher visual quality for different embedding capacities, and our scheme is more efficient compared with related work.

Klíčová slova:

Boats – Digital imaging – Eyes – Imaging techniques – Mathematical functions – Signal to noise ratio – Turtles – Cryptography


1. Zhang M, Zhang Y, Jiang Y, Shen J. Obfuscating eves algorithm and its application in fair electronic transactions in public cloud systems. IEEE System Journal. 2019;13(2):1478–1486.

2. Cheng K, Wang L, Shen Y, Wang H, Wang Y, Jiang X, et al. Secure k-nn query on encrypted cloud data with multiple keys. IEEE Transactions on Big Data.2017;.

3. Wang H, Zhang Z, Taleb T. Special issue on security and privacy of IoT. World Wide Web. 2018;21(1):1–6.

4. Zhang M, Zhang Y, Su Y, Huang Q, Mu Y. Attribute-based hash proof system under learning-with-errors assumption in obfuscator-free and leakage-resilient environments. IEEE Systems Journal. 2015;11(2):1018–1026.

5. Lee C, Chang C, Wang K. An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image and Vision Computing. 2008;26(12):1670—1676.

6. Chang C, Liu Y. Fast turtle shell-based data embedding mechanisms with good visual quality. Journal of Real-Time Image Processing. 2018;.

7. Hong W, Chen T. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security. 2012;7(1):176–184. doi: 10.1109/TIFS.2011.2155062

8. Mielikainen J. LSB matching revisited. IEEE Signal Processing Letters. 2006;13(5):285–287.

9. Zhang X, Wang S. Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters. 2006;10(11):781–783. doi: 10.1109/LCOMM.2006.060863

10. Kim HJ, Kim C, Choi Y, Wang S, Zhang X. Improved modification direction methods. Computers and Mathematics with Applications. 2010;60(2):319–325. doi: 10.1016/j.camwa.2010.01.006

11. Chang C, Chou Y, Kieu T. An Information Hiding Scheme Using Sudoku. In: 2008 3rd International Conference on Innovative Computing Information and Control; 2008. p. 17–17.

12. Chen J. A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Processing: Image Communication. 2014;29(3):375–384.

13. Chang C, Liu Y, Nguyen T. A Novel Turtle Shell Based Scheme for Data Hiding. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing; 2014. p. 89–93.

14. Liu L, Chang C, Wang A. Data hiding based on extended turtle shell matrix construction method. Multimedia Tools and Applications. 2017;76(10):12233–12250.

15. Liu Y, Zhong Q, Chang L, Xia Z, He D, Cheng C. A secure data backup scheme using multi-factor authentication. IET Information Security. 2016;11(5):250–255.

16. Martínez-González RF, Díaz-Meńdez JA, Palacios-Luengas L, Loṕez-Hernández J, Vázquez-Medina R. A steganographic method using Bernoulli’s chaotic maps. Computers and Electrical Engineering. 2016;54:435—449.

17. Yadav GS, Ojha A. Chaotic system-based secure data hiding scheme with high embedding capacity. Computers and Electrical Engineering. 2018;69:447–460.

18. Zhang M, Yao Y, Li B, Tang C. Accountable mobile e-commerce scheme in intelligent cloud system transactions. Journal of Ambient Intelligence and Humanized Computing. 2018;9(6):1889–1899.

19. Wang F, Guo Y, Yin Z, Zhou X, Zhao Q. Data Hiding Method based on Reference Matrix. Procedia Computer Science. 2018;131:800–809.

20. Hong W, Chen T, Shiu C. A Minimal Euclidean Distance Searching Technique for Sudoku Steganography. In: 2008 International Symposium on Information Science and Engineering. vol.1; 2008. p. 515–518.

Článek vyšel v časopise


2019 Číslo 10
Nejčtenější tento týden