Data Hiding Scheme Based on Quad General Difference Expansion Cluster

Ahmad Juniar Ilham (1), Tohari Ahmad (2), Ntivuguruzwa Jean De La Croix (3), Pascal Maniriho (4), Maurice Ntahobari (5)
(1) Department of Information Technology, Institut Sains dan Teknologi Annuqayah, Sumenep, Indonesia
(2) Department of Informatics, Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia
(3) Department of Business Information Technology, College of Business and Economics, University of Rwanda, Kigali, Rwanda
(4) Department of Computer Science and Information Technology, La Trobe University, Melbourne, Australia
(5) Department of Data Science and AI, Monash University, Melbourne, Australia
Fulltext View | Download
How to cite (IJASEIT) :
Ilham, Ahmad Juniar, et al. “Data Hiding Scheme Based on Quad General Difference Expansion Cluster”. International Journal on Advanced Science, Engineering and Information Technology, vol. 12, no. 6, Nov. 2022, pp. 2288-96, doi:10.18517/ijaseit.12.6.16002.
For some periods, information technology has developed, but there are some issues with its data security. For this reason, exploring the data hiding method is relevant, which is an appropriate study in the information concealment paradigm. Several factors must be considered in its implementation, such as the capacity of the confidential data and the quality of the generated stego file. Nevertheless, it is difficult to solve those two problems simultaneously in actual application. We often need to choose either one of them, which is more suitable for a specific environment. In this research, those problems are approached by extending the Quad General Difference Expansion Cluster (QGDEC) method combined with fuzzy logic in the image environment. We use the cluster in the QGDEC, which aims to ensure that the pixel difference is not significant so that the quality of the stego can be maintained. The confidential data can be embedded in multiple layers based on several image characteristics, which can be processed using fuzzy logic. The result of the experiment denotes that the proposed method obtains about 20 dB higher than that of the previous ones regarding the Peak Signal to Noise Ratio (PSNR) for the same capacity of the secret. It depicts that the proposed method is more applicable than the previous ones by considering the specific message size and its respective characteristics.

G. Zhang, Z. Yang, H. Xie, and W. Liu, "A secure authorized deduplication scheme for cloud data based on blockchain," Inf. Process. Manag., vol. 58, no. 3, p. 102510, 2021, doi: 10.1016/j.ipm.2021.102510.

A. A. Gutub and K. A. Alaseri, "Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing," J. King Saud Univ. - Comput. Inf. Sci., no. in press, Available online 28 June 2019, 2019, doi: 10.1016/j.jksuci.2019.06.014.

H. Agrawal and A. A. Agarkar, "LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid," Heliyon, vol. 5(3), 2019, doi: 10.1504/IJICS.2019.10019163.

M. Wrzeszcz, Å. Dutka, R. G. SÅ‚ota, and J. Kitowski, “New approach to global data access in computational infrastructures,” Futur. Gener. Comput. Syst., vol. 125, pp. 575-589, 2021, doi: 10.1016/j.future.2021.06.054.

P. Puteaux, S. Y. Ong, K. S. Wong, and W. Puech, "A survey of reversible data hiding in encrypted images - The first 12 years," J. Vis. Commun. Image Represent., vol. 77, no. September 2020, p. 103085, 2021, doi: 10.1016/j.jvcir.2021.103085.

A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar, "Digital audio steganography: Systematic review, classification, and analysis of the current state of the art," Comput. Sci. Rev., vol. 38, p. 100316, 2020, doi: 10.1016/j.cosrev.2020.100316.

Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, "Video steganography: A review," Neurocomputing, vol. 335, pp. 238-250, 2019, doi: 10.1016/j.neucom.2018.09.091.

P. Maniriho and T. Ahmad, "Information hiding scheme for digital images using difference expansion and modulus function," J. King Saud Univ. - Comput. Inf. Sci., vol. 31, no. 3, pp. 335-347, 2019, doi: 10.1016/j.jksuci.2018.01.011.

F. R. Shareef, "A novel crypto technique based ciphertext shifting," Egypt. Informatics J., vol. 21, no. 2, pp. 83-90, 2020, doi: 10.1016/j.eij.2019.11.002.

C. C. Chen, C. C. Chang, and K. Chen, "High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels," J. Vis. Commun. Image Represent., vol. 76, no. January 2020, p. 103060, 2021, doi: 10.1016/j.jvcir.2021.103060.

D. Huang and J. Wang, "Image Communication High-capacity reversible data hiding in encrypted image based on specific encryption process," Signal Process. Image Commun., vol. 80, no. July 2019, p. 115632, 2020, doi: 10.1016/j.image.2019.115632.

B. Guan and D. Xu, "An efficient high-capacity reversible data hiding scheme for encrypted images," J. Vis. Commun. Image Represent., vol. 66, p. 102744, 2020, doi: 10.1016/j.jvcir.2019.102744.

S. Yi, Y. Zhou, and Z. Hua, "Signal Processing”¯: Image Communication Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion," Signal Process. Image Commun., vol. 64, no. March, pp. 78-88, 2018, doi: 10.1016/j.image.2018.03.001.

X. Wang, C. C. Chang, and C. C. Lin, "Reversible data hiding in encrypted images with block-based adaptive MSB encoding," Inf. Sci. (Ny)., vol. 567, pp. 375-394, 2021, doi: 10.1016/j.ins.2021.02.079.

H. Ren, W. Lu, and B. Chen, "Reversible data hiding in encrypted binary images by pixel prediction," Signal Processing, vol. 165, pp. 268-277, 2019, doi: 10.1016/j.sigpro.2019.07.020.

R. Kumar and K. Jung, "Robust reversible data hiding scheme based on two-layer emb e dding strategy," Inf. Sci. (Ny)., vol. 512, pp. 96-107, 2020, doi: 10.1016/j.ins.2019.09.062.

A. J. Ilham, P. H. Bawa, and T. Ahmad, "Protecting Secret Data using RDE and Fuzzy Logic to Specify the Embedding Level," Proc. 2019 IEEE Int. Conf. Signal Image Process. Appl., vol. 19, pp. 254-258, 2019, doi: https://doi.org/10.1109/ICSIPA45851.2019.8977778.

S. Sajasi, A. Masoud, and E. Moghadam, "A High Quality Image Steganography Scheme Based on Fuzzy Inference System," 2013 13th Iran. Conf. Fuzzy Syst., pp. 1-6, 2013, doi: 10.1109/IFSC.2013.6675666.

Z. Ashraf, M. L. Roy, P. K. Muhuri, and Q. M. D. Lohani, "A Novel Image Steganography Approach Based on Interval Type-2 Fuzzy Similarity," 2018 IEEE Int. Conf. Fuzzy Syst., vol. 18, pp. 1-8, 2018, doi: https://doi.org/10.1109/FUZZ-IEEE.2018.8491582.

J. Hou, B. Ou, H. Tian, and Z. Qin, "Reversible data hiding based on multiple histograms modification and deep neural networks," Signal Process. Image Commun., vol. 92, no. December 2020, 2021, doi: 10.1016/j.image.2020.116118.

J. Wang, N. Mao, X. Chen, J. Ni, and C. Wang, "Multiple histograms based reversible data hiding by using FCM clustering," Signal Processing, vol. 159, pp. 193-203, 2019, doi: 10.1016/j.sigpro.2019.02.013.

Y. Tsai, D. Tsai, and C. Liu, "Reversible data hiding scheme based on neighboring pixel differences," Digit. Signal Process., vol. 23, no. 3, pp. 919-927, 2013, doi: 10.1016/j.dsp.2012.12.014.

S. Das, A. K. Sunaniya, R. Maity, and N. P. Maity, "Efficient FPGA implementation and verification of difference expansion based reversible watermarking with improved time and resource utilization," Microprocess. Microsyst., vol. 83, no. December 2020, p. 103732, 2021, doi: 10.1016/j.micpro.2020.103732.

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, 2019, doi: 10.1016/j.neucom.2018.06.075.

S. R. Muttaqi and T. Ahmad, "A new data hiding method for protecting bigger secret data," 2019, doi: 10.1109/ICTS.2019.8850938.

A. M. Alattar, "Reversible watermark using difference expansion of quads," IEEE Int. Conf. Acoust. Speech, Signal Process., vol. 3, no. 1, pp. 377-380, 2004, doi: 10.1109/ICASSP.2004.1326560.

D. Lou, M. Hu, and J. Liu, "Multiple layer data hiding scheme for medical images," Comput. Stand. Interfaces, vol. 31, pp. 329-335, 2009, doi: 10.1016/j.csi.2008.05.009.

X. Yuan, Z. Liu, and E. S. Lee, "Center-of-gravity fuzzy systems based on normal fuzzy implications," Comput. Math. with Appl., vol. 61, no. 9, pp. 2879-2898, 2011, doi: 10.1016/j.camwa.2011.03.074.

A. P. Rahardjo, “Penggunaan Klaster Piksel untuk Meningkatkan Kinerja Reduced Difference Expansion (The Use of Pixel Clusters to Improve the Performance of Reduced Difference Expansion),” Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia, 2014.

"eMicrobes Digital Library.".

"The USC-SIPI Image Database.".

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).