PVO based reversible data hiding technique for roughly textured images
- PDF / 3,846,253 Bytes
- 26 Pages / 439.37 x 666.142 pts Page_size
- 26 Downloads / 218 Views
PVO based reversible data hiding technique for roughly textured images Gurjinder Kaur1 · Samayveer Singh1 · Rajneesh Rani1 Received: 15 March 2020 / Revised: 8 August 2020 / Accepted: 8 November 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2021
Abstract Recently, several reversible data hiding (RDH) techniques based on pixel value ordering (PVO) have been proposed that precisely embed the secret data into cover images. As the neighboring pixels in smooth images are highly correlated, these methods perform better for smooth images but achieve comparatively low performance for roughly textured images. In many application domains like satellite imagery, the cover images are not always smooth. So, the performance of existing PVO based methods for roughly textured images needs to be improved. In this paper, we propose a novel RDH method based on PVO that is specially designed for improving the hiding performance in roughly textured images. In the proposed method, a segmentation scheme is used to cluster the pixels into different segments based on their intensity values. The segmentation ensures that the pixels in each segment are highly correlated to each other and each segment is divided into non-overlapping blocks of size 2 × 2 where a block can hide at most two data bits in the smallest and the largest valued pixel. The size of the block is further extended by 2 × 1 pixels if the complexity level of the block is ‘0’. The proposed method results in an increase in the hiding capacity as well as the visual quality of the stego images as the correlation of each block is increased which in turn limits the number of shifted pixels. The experimental results also prove the superiority of the proposed method against the existing PVO based RDH methods. Keywords Reversible data hiding · Segmentation · Pixel value ordering · Rough images
B
Samayveer Singh [email protected] Gurjinder Kaur [email protected] Rajneesh Rani [email protected]
1
Department of Computer Science and Engineering, Dr B R Ambedkar National Institute of Technology Jalandhar, Jalandhar, Punjab, India
123
Multidimensional Systems and Signal Processing
1 Introduction With the advent of several communication technologies and the rise of data transmission over networks, the security threats for sensitive data have also emerged. This leads to an immediate need to incorporate security measures for the protection of one’s valuable data. To prevent security compromises, the two important methodologies are cryptography and steganography (Kaur and Kumar 2020). In cryptography, the purpose is to convert the intelligible information to some unintelligible form but the conversion of valuable information to a meaningless form catches the interest of attackers. On the other hand, steganography is the technique to hide secret information into cover media to provide imperceptibility. The cover media looks like an ordinary piece of digital content. Steganography is realized using various data hiding methods. Although the developmen
Data Loading...