Novel Scheme for Data Hiding in Binary Images using Cover Pattern Histogram

Document Type : Original Article


1 Department of Computer Engineering, BV(DU)COE, Pune, VPKBIET, Baramati, Pune, Maharashtra, India

2 Department of Computer Engineering, BV(DU)COE, Pune, Maharashtra, India


In today's digital age, security and safe communication are necessities. Applications frequently transport large amounts of private data as binary images. This research proposes a unique scheme that uses a cover pattern histogram-based decision tree for information concealment and extraction from binary images. This research aims to provide a data-hiding approach with a large capacity for data concealment, possible minor distortion, security, and difficulty discovering hidden data. This method uses high-frequency 3X3 pixel block patterns to obscure data. The two series of pattern's are identified based on sorted block pattern frequency. To construct a decision tree for embedding, these series patterns, key bits, and information bits work together as parameters. Information is encrypted using a secret key to ensure message security before being hidden. A decision tree decides the block suitability and bit embedding with or without flipping at the sender side. A histogram of 3X3 pixel block patterns gets generated for the received image containing concealed data, and two series are recognized similarly to the embedding procedure at the receiver side. A decision tree assesses whether an image block carries an information bit and decides whether the bit is "0" or "1". This decision tree extracts hidden data bits by analyzing series patterns and key bits. The secret key decodes retrieved concealed bits and reveal the original data. According to research, 50-80 % of hidden bits are transmitted without flipping the pixels, automatically reducing visual distortion. This scheme performs better than comparable methods and is applicable in steganography and watermarking.


Main Subjects

  1. Tseng, Y.-C. and Pan, H.-K., "Data hiding in 2-color images", IEEE Transactions on Computers, Vol. 51, No. 7, (2002), 873-880. doi: 10.1109/TC.2002.1017706.
  2. Filler, T., Judas, J. and Fridrich, J., "Minimizing additive distortion in steganography using syndrome-trellis codes", IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, (2011), 920-935. doi: 10.1109/TIFS.2011.2134094.
  3. Mei, Q.G., Wong, E.K. and Memon, N.D., "Data hiding in binary text documents", in Security and watermarking of multimedia contents III, SPIE. Vol. 4314, (2001), 369-375.
  4. Chhajed, G.J., Inamdar, V. and Attar, V., "Steganography in black and white picture images", in 2008 Congress on Image and Signal Processing, IEEE. Vol. 2, (2008), 141-144.
  5. Deshmukh, K.V. and Chhajed, G.J., "A steganographic method for data hiding in binary image using edge based grids", International Journal of Computer Applications in Technology, Vol. 5, No. 4, (2014), 1369-1374.
  6. Lu, H., Shi, X., Shi, Y.Q., Kot, A.C. and Chen, L., "Watermark embedding in dc components of dct for binary images", in 2002 IEEE Workshop on Multimedia Signal Processing., IEEE. (2002), 300-303.
  7. Wu, M. and Liu, B., "Data hiding in binary image for authentication and annotation", IEEE Transactions on Multimedia, Vol. 6, No. 4, (2004), 528-538. doi: 10.1109/TMM.2004.830814.
  8. Yang, H. and Kot, A.C., "Pattern-based data hiding for binary image authentication by connectivity-preserving", IEEE Transactions on Multimedia, Vol. 9, No. 3, (2007), 475-486. doi: 10.1109/TMM.2006.887990.
  9. Yang, H., Kot, A.C. and Rahardja, S., "Orthogonal data embedding for binary images in morphological transform domain-a high-capacity approach", IEEE Transactions on Multimedia, Vol. 10, No. 3, (2008), 339-351. doi: 10.1109/TMM.2008.917404.
  10. Tseng, Y.-C., Chen, Y.-Y. and Pan, H.-K., "A secure data hiding scheme for binary images", IEEE Transactions on Communications, Vol. 50, No. 8, (2002), 1227-1231. doi: 10.1109/ICWAPR.2007.4420668.
  11. Yang, H. and Kot, A.C., "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier", IEEE Signal Processing Letters, Vol. 13, No. 12, (2006), 741-744. doi: 10.1109/LSP.2006.879829.
  12. Xuan, G., Shi, Y.Q., Chai, P., Tong, X., Teng, J. and Li, J., "Reversible binary image data hiding by run-length histogram modification", in 2008 19th International Conference on Pattern Recognition, IEEE. (2008), 1-4.
  13. Feng, B., Lu, W. and Sun, W., "Secure binary image steganography based on minimizing the distortion on the texture", IEEE Transactions on Information Forensics and Security, Vol. 10, No. 2, (2014), 243-255. doi: 10.1109/TIFS.2014.2368364
  14. Cao, H. and Kot, A.C., "On establishing edge adaptive grid for bilevel image data hiding", IEEE Transactions on Information Forensics and Security, Vol. 8, No. 9, (2013), 1508-1518. doi: 10.1109/TIFS.2013.2274041.
  15. Guo, M. and Zhang, H., "High capacity data hiding for binary image authentication", in 2010 20th International Conference on Pattern Recognition, IEEE. (2010), 1441-1444.
  16. Pevný, T., Filler, T. and Bas, P., "Using high-dimensional image models to perform highly undetectable steganography", in Information Hiding: 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers 12, Springer. (2010), 161-177.
  17. Wu, N.-I. and Hwang, M.-S., "Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images", Displays, Vol. 49, (2017), 116-123. doi.
  18. Mol, M.H. and Reji, P., "A secure binary data hiding and comparison technique", International Journal of Scientific Engineering and Research, Vol. 7, No. 7, (2016), 810.
  19. Feng, B., Lu, W. and Sun, W., "High capacity data hiding scheme for binary images based on minimizing flipping distortion", in Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers 12, Springer. (2014), 514-528.
  20. Bhattacharyya, D., Haveliya, A. and Kim, T.-h., "Secure data hiding in binary text document for authentication", Applied Mathematics, Vol. 8, No. 1L, (2014), 371-378. doi: 10.12785/amis/081L47.
  21. Ding, W. and Wang, Y., "Data hiding in binary image with high payload", Arabian Journal for Science and Engineering, Vol. 43, No., (2018), 7737-7745. doi.
  22. Liu, T.-H. and Chang, L.-W., "An adaptive data hiding technique for binary images", in Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., IEEE. Vol. 4, (2004), 831-833.
  23. Manikandan, V. and Masilamani, V., "Reversible data hiding scheme during encryption using machine learning", Procedia Computer Science, Vol. 133, (2018), 348-356. doi.
  24. Nguyen, T.-S., Chang, C.-C. and Hsueh, H.-S., "High capacity data hiding for binary image based on block classification", Multimedia Tools and Applications, Vol. 75, (2016), 8513-8526. doi.
  25. Lee, Y., Kim, H. and Park, Y., "A new data hiding scheme for binary image authentication with small image distortion", Information Sciences, Vol. 179, No. 22, (2009), 3866-3884. doi.
  26. Yin, X., Lu, W., Zhang, J., Chen, J. and Liu, W., "Reversible data hiding in binary images by flipping pattern pair with opposite center pixel", Journal of Visual Communication and Image Representation, Vol. 70, (2020), 102816. doi.
  27. Li, F., Zhang, L. and Wei, W., "Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression", EURASIP Journal on Image and Video Processing, Vol. 2020, (2020), 1-21. doi.
  28. Chhajed, G.J. and Garg, B.R., Applying decision tree for hiding data in binary images for secure and secret information flow, in Cybersecurity measures for e-government frameworks. 2022, IGI Global.175-186.
  29. Chhajed, G. and Garg, B., "Data hiding in binary images for secret and secure communication using decision tree", in 4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing: BDCC 2021, Springer. (2022), 69-84.
  30. Chhajed, G. and Garg, B., "Information security by hiding data in binary images based on block-diagonal partition pattern", in 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), IEEE. (2022), 1-6.
  31. J Chhajed, G. and Garg, B.R., "Hiding data in binary images using block-diagonal partition pattern", International Journal of Computing and Digital Systems, (2023). doi.
  32. Asadi Saeed Abad, F. and Hamidi, H., "An architecture for security and protection of big data", International Journal of Engineering, Transactions A: Basics, Vol. 30, No. 10, (2017), 1479-1486.