Improved data hiding method for securing color images

Faculty Computer Science Year: 2021
Type of Publication: ZU Hosted Pages: 12641–12670
Authors:
Journal: Multimedia Tools and Applications Springer Volume:
Keywords : Improved data hiding method , securing color    
Abstract:
Recently, data hiding techniques have become very popular in several vital applications, especially in telemedicine. The reason for this is their ability to give good results such as high embedding capacity while preserving visual image quality as much as possible after extracting the hidden secret message. In earlier studies, many researchers have achieved the goal of reversible data hiding (RDH) algorithm. All these methods have achieved excellent results on standard and natural images. However, in the case of medical images, especially color medical images, we face the problem of how to preserve the visual quality of image contents while achieving the goals of RDH in avoiding the loss of patient data or the distortion of the diagnosing image. In this paper, we proposed a secure data hiding method using a hyper chaotic map and left-most embedding strategy. The proposed methods are hybrid, where it is applied in the DCT frequency domain and encrypted domain together as presented here. This gives a higher embedding rate and higher visual image quality than existing methods without any loss or distortion of both hidden secrets data and reconstructed image. The novelty of this paper is to embed the desired secret data in each quantized block of DCT using (8-bit LMSB) strategy for embedding process. We tested our algorithm on both color medical images and standard color images of different sizes and different formats. We evaluated the performance of our algorithm on the basis of the quality metrics MSE, PSNR, BER, SSIM, Correlation, Symbol Error Rate, additional quality evaluation metrics, execution time, and different types of geometric and signal attacks. All of these parameters are demonstrated and represented in this proposed work in detail.
   
     
 
       

Author Related Publications

  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", THE IMAGING SCIENCE JOURNAL, 2018 More
  • Nabil Ali Mohamed Lashen, "Copy-for-duplication forgery detection in colour images using QPCETMs and subimage approach", IET Image processing, 2019 More
  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", The Imaging Science Journal, 2018 More
  • Nabil Ali Mohamed Lashen, "A Novel CAD System for Reliable Classification of Microcalcifications in Digital Mammograms", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 1, OCTOBER 2010, 2010 More
  • Nabil Ali Mohamed Lashen, "A comparison among Features Used in Offline Signature Verification Systems", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010, 2010 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet