Abstract

Steganography is a tool which allows the data for transmission by concealing secret information in a tremendously growing network. In this paper, a novel technique quick response method (QRM) is proposed for the purpose of encryption and decryption. Existing system uses side match vector quantization (SMVQ) technique which has some challenges such as security issues and performance issues. To handle the security and performance issues, the proposed system uses two methods, namely, quick response method and shifting method. In the proposed system, encoding part calculates the performance for capacity, PSNR (peak signal-to-noise ratio), MSE (mean square error), and SSIM (structural similarity index method), and the decoding part calculates the performance of MSE (mean square error) and PSNR (peak signal-to-noise ratio). The shifting method is used to increase the data hiding capacity. In this system, the encryption part embeds the secret image using steganography and the decryption part extracts the original image. By analyzing and comparing the proposed system with the existing system, it is proved that the system proposed was much better than the existing systems.

1. Introduction

For the security purpose, data hiding process is used to embed the data into digital media. It delivers large volume for secret information hiding which results into stego image imperceptible to human vision. Data hiding such as image and text that permits the cover image to be improved after the embedded message is mined from the marked image. Data hiding is broadly used to hide the secret information into a cover information like a video file, an audio file, and an image [1]. For efficient storage and transmission, embed data into an image and link with compression. Medical images are transferred from one hospital to another hospital for review by physicians across the globe. Such medical image data has to be stored in the database for future reference of patients. Normally, these medical images are compressed and stored before being transmitted over the Internet. Similarly, the patient data is also embedded within the medical images. The hidden and the host image data can be recovered from the embedded image without any data loss [2]. In RDH (reversible data hiding), the data to be covered up is embedded in the cover image. Data hiding technique and image compression technique can be integrated as one single module [3]. Reversible data hiding can embed the message data in a host image without any loss of the host image. If watermarked image is used for image authentication, with the improved histogram-based reversible data hiding scheme which is based on prediction and sorting, the original image can be reverted before the embedding process. This histogram-based embedding increases the capacity of the embedding process [4]. The steganography method is aimed at secretly hiding the data in a multimedia medium between two sides to conceal the occurrence of the message. It is based on two important factors such as embedding payload and efficiency. It gives the result that creates it suitable to transfer data without being censored and the data interrupted. Data security is broadly based on encryption and for few cases based on an extra layer of security [5]. A high embedding performance is offered by transform domain JPEG image steganography method [6]. Histogram shifting technique in integer wavelet transform area converts information into higher frequency wavelet coefficients subbands. The histogram modification approach is useful to avoid overflow and underflow. It reallocates a fraction of the larger frequency wavelet subband histogram and consequently inserts data with the help of generated histogram zero-point.

The proposed method performance with data embedding payload is compared with the performance of existing methods in integer cosine transform domain, spatial domain, and integer wavelet transform domain. The maximum embedding payload in the same visual quality is computer by PSNR or has a higher PSNR in the same payload. At the time of shifting operation performed high-frequency integer wavelet subbands, the overflow (e.g., for an 8-bit image, the value of pixel grayscale exceeds 255) and/or underflow (e.g., for an 8-bit image, the pixel grayscale value below 0) could take place, hence preventing the lossless need consecutively to overcome overflow and/or underflow [7]. Image decompression is based on side match vector quantization (SMVQ). At the sender side, vector quantization is applied to composite blocks, to manage visual deformation and error flow. Image is segmented into nonoverlapping blocks. The leftmost and upmost blocks are compressed using vector quantization. Remaining blocks are compressed by side match vector quantization (SMVQ). At the receiver side, reconstruction of image takes place. Extraction phase consists of exactly reverse process, i.e., decompression side match vector quantization (DSMVQ) [8].

A high-capacity modified steganography technique using wavelet transform was reported by Ali et al. In this technique, the original cover image was preadjusted such that the reconstructed pixels from the embedded coefficients would not exceed its threshold value. The drawback of the proposed method is the computational overhead. This technique obtained the PSNR value of 40.98%. Acharya et al. have proposed a method to hide multiple secret images and keys in color cover image using integer wavelet transform (IWT) using image steganography technique. The average PSNR value obtained is 44.7%. Sathish et al. suggested a high-capacity and optimized image steganography technique based on ant colony optimization algorithm. This technique achieved the PSNR value of 40.83. Ahmed et al. used nonlinear properties of quantum walks to design a novel technique for constructing S-boxes and applied those S-boxes to design a new steganography technique. The proposed method obtained the PSNR value which is 44.26%. Nadish et al. embedded the data in the edge pixel of carrier image using an improved image steganography. The PSNR value for this technique obtained is 45.33%. The organization of the paper is categorized as follows. Section 1 explains the introductory part of data hiding and steganography. Section 2 illustrates the related work based on the steganography. Section 3 describes the proposed quick response technique-based steganography. Section 4 elaborates the results and discussion. Finally, Section 5 gives the conclusion of the paper.

3. Proposed Quick Response-Based Steganography

The proposed quick response technique is developed such that the capacity for encoding process is increased. With the help of ZXing (open source library) and MATLAB, it can be retrieved. The algorithms are applied to process the QR codes which include some geometric properties like area, centroid, bounding box for finding and varying the color of “finder patterns,” and its conditions for each code with several colors in MATLAB thus maximizing into three dimensions. To create three-dimensional quick response code encoding process, three processed codes are added for three separate messages. The reverse operation was performed for decoding process such that encoded code was initially delayered by splitting the red, green, and blue channels and subsequently thresholder to go again the originally encoded quick response codes. The improved patterns include the most important in covert applications. Histogram shifting method prevents overflow and underflow issues which enhances the visual quality of image and data hiding capacity. Quick response code technique is used to encrypt the cover image and later decrypt the original information with high quality.

Initially, the image data is partitioned into two main blocks. In the processing step, the histogram is created for every block. The quantity of data which can be embedded within image blocks is more by comparing the embedding within a single image. The proposed block schematic for encoding and decoding process is shown in Figures 1 and 2.

3.1. Image Acquisition

The input image was color which may be in the file format of (jpg, png, bmp, and tiff) and compressed or uncompressed formats. Then, the image is transformed into a color space. The different color spaces are RGB, HSV, YIQ, LAB, and YCbCr. Image enhancement is to increase the quality of images using spatial, frequency, and watermark transform domain.

3.2. Filter Image

The filtering takes both spatial and intensity domain information in calculating the edge-preserving smoothing output for an input image. It replaces the intensity of each pixel with intensity values from nearby pixels.

3.3. Histogram Shifting

Monotonic mapping between a test and reference image of histograms is computed by histogram shifting. Test and reference images can be any of the permissible data types and need not be equal in size. This shifting technique increases the contract based on similarity between test and reference image.

3.4. QR Method

QR code is two-dimensional barcode which is categorized in matrix barcode that can store large alphanumeric information. Barcode consists of black modules arranged in white background. Data can be restored even if the symbol is partially dirty or damaged. of a given image in the form of a matrix is defined as where is an orthonormal matrix and is an upper triangular matrix. and are denoted as and , respectively.

Embedding algorithm: (i)Read a test image(ii)Make QR decomposition with a watermark image(iii)Apply discrete wavelet transform (DWT) on both test and QR decomposition images(iv)Insert the QR decomposition image into test image(v)Reconstruction of test image to apply inverse of DWT(vi)Finally, we get embedded image

Extraction algorithm: (i)Read the embedded image and test image(ii)Apply DWT on both test and embedded images(iii)Subtract embedded image with the test image and get the QR decomposition image(iv)By using QR decomposition reader extract watermark image from the QR decomposition image

Cover: the data or image which is masked inside the secret message. Embedding and extraction processes: in this process, the secret data was enveloped inside the cover and the hidden data can be recovered. Encryption: this is an embedding process where the secret data is coded [9]. Stego information: the information obtained at the end of the embedding process is known as stego information. Decoding process: the extraction phase can be followed by a suitable decoding phase depending upon whether encryption was used or not during embedding [10]. Steganography: steganography based on text, audio, video, or image is used as the cover medium. Digital image stenographic concepts are very famous mediums applied worldwide for data transfer in addition to data hiding [11]. Steganography mapping for a digital image using embedding and extraction process is given by where is the embedding function, the extraction function, the cover image, the stego image, the set of keys, and the set of secret messages.

3.5. Peak Signal-to-Noise Ratio and Mean Square Error Computation

The PSNR calculates the peak signal-to-noise ratio, among the two different images expressed in terms of decibels. This relation is frequently used as an excellence measurement between the original and a compressed image. For better quality measurement, the value of PSNR should be high; thus, it produces a high-quality image even if it is a compressed or reconstructed image [12]. The mean square error (MSE) and the peak signal-to-noise ratio (PSNR) are the two most important terms for the accurate image quality determination. When the value of MSE is lower, the error obtained is also reduced [13].

PSNR can be calculated using equations (3) and (4). where is the number of rows and is the number of columns in the input image. After that, the block calculates the PSNR using the given equation: where can be varied based on the input image data type.

3.6. Structural Similarity Index Method

The structural similarity index method (SSIM) is a method for determining the stego image quality. SSIM is used for computing the similarity of two images. This measures the image quality based on an uncompressed or distortion-free image. SSIM is simulated to develop on the latest techniques such as peak signal-to-noise ratio (PSNR) and mean squared error (MSE) [14]. SSIM is measured from the host image and the dense image. It is calculated based on the important metrics, namely, contrast and luminance [15].

The SSIM index is measured based on various images. The measure between two images and of common size is where is the average of , is the average of , is the average of , is the average of , and is the covariance of and .

provides a weak denominator to stabilize. is the pixel dynamic range value, and by default. The symmetry condition for SSIM index is using this formula:

With, in addition to the above definition,

SSIM is the a weighted combination of those comparative measures

Generally, SSIM expression is based on three measurements between the test images of and : luminance (lu), contrast (co), and structure (st). The entity comparison approach evaluates the image quality [16].

4. Results and Discussion

The proposed technique was evaluated for the security efficiency on both the gray level and color images. The following subsections describe the encoding and decoding process and their performance analysis of the proposed system [17]. The encoding process of the proposed system consists of the following subprocesses: (i) input image, (ii) filtered image, (iii) histogram shifting, (iv) embedding, and (v) stego image. The decoding process of the proposed technique consists of the following subprocesses: (i) embedded image and (ii) extraction.

4.1. Encoding Process

The following section describes the encoding process of the proposed system. Initially, the cover image is taken as an input image [18]. Then, the input image is filtered using trilateral filter and the filtered image is given to the histogram shifting to increase the data hiding capacity of the proposed system. The resultant image is embedded with secret. Image/text using embedding technique is called the quick response method. The stego image is obtained from the embedded image, and the evaluation of the performance provides better results than the other existing systems.

Input image is given by the user. Figure 3(a) shows the user given over image. The filtered image is obtained from the given input image using trilateral filter as shown in Figure 3(b). Histogram shifting is a technique which is done on each block of the image. Figure 3(c) shows the histogram shifted image and its histogram [19]. Embedding is the process of inserting text/image behind the original image. This process is carried out using the quick response method. This method improves the data hiding capacity of the proposed system. Figure 3(d) shows the message file and histogram of hided image. At first, cover image segmentation is done on the embedded image and it is the process of dividing the images using discrete wavelet transform. Figure 4 shows the representation of cover image segmentation.

Steganography is a process of communicating secretly where the text/image is hidden in another image. It increases the data hiding capacity of the proposed system. The figure shows the stego image and its histogram.

4.2. Decoding Process

The following section explains the decoding process of the proposed system. Initially, the reconstructed cover image is taken as an input image. The hidden text/image is extracted from the reconstructed cover image or embedded image using inverse quick response method [20]. Finally, the performance evaluation is done on the reconstructed cover image and it provides better results than the other existing systems. Figures 5(a)5(c) show the reconstructed cover image, the hidden text/image extracted from the reconstructed cover image, and its histogram.

4.3. For Color Image

Similarly, the encoding and decoding process of the proposed system was carried out for the color images. Figures 6(a) and 6(b) show the cover image and its histogram. Figure 6(c) shows the filtered image which is done with the help of trilateral filter for color images. The histogram shifted image and its shifted histogram are shown in Figures 6(d) and 6(e). The filtered color image is given as an input for histogram shifting technique [21]. The histogram shifted image is embedded with message file using quick response method as shown in Figures 6(d) and 6(e). Figures 6(f) and 6(g) show the message file and its histogram.

The cover image segmentation for color image is carried out using discrete wavelet transforms as shown in Figure 7(a) [22]. The stego image is obtained from the resultant embedded image. Figures 7(b) and 7(c) show the stego image and its histogram. Finally, the hidden data/image is extracted from the cover image. Figures 8(a)8(c) show the cover image, message file, and histogram for the cover image.

Table 1 shows the performance analysis of both encoding and decoding process of the proposed system using quick response-based steganography technique. The table illustrates the simulation results including the following parameters: test images, secret image, capacity, and encoding and decoding parameters (Mishra, 2016). The encoding parameters are SSIM, MSE, and PSNR. The decoding parameters are MSE and PSNR.QR-based steganography technique with various message sizes on various grayscale images is determined. Moreover, the mean square error and average PSNR values are explained.

Mean square error and PSNR values for secret data are clearly illustrated for the test images such as Barbara, Helen, Lenna, Lighthouse, Mandrill, and Owl as shown in Figure 9. The MSE for encoding process, MSE for decoding process, PSNR value for encoding process, and PSNR value for decoding process are described in this graph.

The result of simulation shows the mean square error and PSNR values for secret images are clearly illustrated for the test images such as Barbara, Helen, Lenna, Lighthouse, Mandrill, and Owl as shown in Figure 10. The MSE for encoding process, MSE for decoding process, PSNR value for encoding process, and PSNR value for decoding process are described in this graph. Figure 10 depicts the graphical representation of obtained hiding capacity values for the test images. The test image Owl has higher capacity compared to other test images. From the graph, the test image light images have the lower hiding capacity value. The results of steganography capacity denote the most significant view of any stenographic method.

Figure 11 depicts the graphical representation of obtained hiding capacity values for the test images. The test image Owl has higher capacity compared to other test images. From the graph, the test image light images have the lower hiding capacity value. The results of steganography capacity denote the most significant view of any stenographic method. The capacity of all cover images to embed the secret image increases, and the QR method increases the security of the secret information.

The SSIM graphical representation for the test images is shown in Figure 12. By using the proposed technique, the obtained value for SSIM using different test images is clearly mentioned to evaluate the proposed method performance.

Figure 13 shows the graph for MSE difference between the secret image and data.

Figure 14 shows the graph for PSNR difference between the digital image and data. From the graph, the PSNR value obtained for secret data is higher for all test images compared to the PSNR value for secret images. Secret messages should be protected not only in the cyber domain but also in the complex physical domain [23]. The results of Table 2 show that the proposed QR-based steganography method yields better results than all the existing techniques in almost all stenographic images. From this table, by using the proposed method, the PSNR value obtained for the test images Barbara, Mandrill, Lenna, and Pepper is 52.53 dB, 52.60 dB, 52.53 dB, and 52.61 dB, respectively. Steganography conceals the existence of a secret message while cryptography alters the message format itself [24].

Figure 15 clearly shows the comprehensive results of different algorithms as well as the proposed quick response algorithm. The proposed algorithm was considered to be the threshold value to calculate the PSNR percentage for all the existing algorithms.

From Figure 16, it is proved that the PSNR is much improved in the proposed quick response algorithm by 2.5% compared to the best existing algorithm. The higher the PSNR, the better the quality of the compressed or reconstructed image.

5. Conclusion

The data hiding and stenographic capacity is the most significant aspect of the proposed system. A novel data hiding technique is proposed to improve the security of the proposed system. The histogram shifting method ensures the improvement in data hiding capacity, and the quick response method is helpful in extracting the hidden data or image from the original cover image. Several images were taken as test images, and the experiment was carried out on these test images. The resultant images proved that the proposed technique enhances the data hiding capacity by embedding the secret data/image in the cover image using the shifting method. The performance analysis of both encoding and decoding process provides better result than any other techniques used for data hiding.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.