EconPapers    
Economics at your fingertips  
 

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing

Maham Nasir, Waqas Jadoon, Iftikhar Ahmed Khan, Nosheen Gul, Sajid Shah (), Mohammed ELAffendi and Ammar Muthanna
Additional contact information
Maham Nasir: Department of Computer Sciences, Comsats University Islamabad, Abbottabad Campus, Islamabad 22060, Pakistan
Waqas Jadoon: Department of Computer Sciences, Comsats University Islamabad, Abbottabad Campus, Islamabad 22060, Pakistan
Iftikhar Ahmed Khan: Department of Computer Sciences, Comsats University Islamabad, Abbottabad Campus, Islamabad 22060, Pakistan
Nosheen Gul: Department of Computer Sciences, Comsats University Islamabad, Abbottabad Campus, Islamabad 22060, Pakistan
Sajid Shah: Department of Computer Sciences, Comsats University Islamabad, Abbottabad Campus, Islamabad 22060, Pakistan
Mohammed ELAffendi: EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
Ammar Muthanna: Department of Applied Probability and Informatics, Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya, 117198 Moscow, Russia

Mathematics, 2022, vol. 10, issue 18, 1-18

Abstract: Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open environments such as the cloud and internet. Integrity and undetectability of steganographic images are amongst the main concerns in any RDH scheme. As steganographic encryption using linear prediction over bit-planes is challenging, so the security and embedding capacity of the existing RDH techniques could not be adequate. Therefore, a new steganographic technique is proposed which provides better security, higher embedding capacity and visual quality to the RDH scheme. In this technique, the cover image is divided into n-bit planes (nBPs) and linear prediction is applied to it. Next, the histogram of the residual nBPs image is taken, and secret data bits are encrypted using the RC4 cryptographic algorithm. To embed the encrypted secret data bits, the histogram shifting process is applied. This is achieved by using peak and zero pairs of residual nBPs images. This scheme provides security to the cover image and hidden data. The proposed RDH scheme is capable of extracting the embedded secret data accurately and recovering the original cover or residual nBPs image.

Keywords: RDH (Reversible Data Hiding); LSB (least significant bit); histogram shifting; RC4 encryption; bpp (bits per pixel); nBPs (n bit-planes); PSNR (peak to noise ratio); chi-square attack; LPC (linear predictive coding) (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/18/3311/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/18/3311/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:18:p:3311-:d:913007

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:10:y:2022:i:18:p:3311-:d:913007