Abstract
This paper proposes a data-hiding scheme for quality access control of digital images using quantization index modulation (QIM) and its hardware implementation. To achieve the goal, an encoded binary message is embedded over N-mutually orthogonal signal points using the QIM technique but without complete self-noise suppression. It is well known that due to the insertion of external information, there will be degradation in the visual quality of the host image. This feature may be used in access control through the reversible process. At the decoder side, watermark bits are extracted using minimum distance decoding. Self-noise is then suppressed by the authorized user to provide a better quality of the image. Moreover, for real-time implementation, field-programmable-gate-array (FPGA) based hardware architecture is also proposed. The scheme is tested over a large number of benchmark images, and the experimental results are compared with the related scheme and found to be superior. It is also seen that (a) in real-time processing, the scheme saves 87.86% power than the related implementation found in the literature, (b) a very high throughput of 119.54 Megabyte/s and 119.048 Mbps are achieved for encoder and pipelined decoder at the maximum operating frequency of 120.013 MHz and 120.01 MHz, respectively for the processing of (512 × 512) sized images.
Similar content being viewed by others
References
Belhadj H, Aggarwal V, Pradhan A, Zerrouki A (2009) Power-aware FPGA design. Actel corporation white paper 75.
Braci S, Delpha C, Boyer R (2011) How quantization based schemes can be used in image steganographic context. Signal Process Image Commun 26:567–576. https://doi.org/10.1016/j.image.2011.07.006
Buch KD (2018) Low power architecture and HDL coding practices for on-board hardware applications. https://nepp.nasa.gov/mapld_2009/talks/.../Buch_Kaushal%20D._mapld09_pres_2.ppt. Accessed 09 March 2018
Cachin C (1998) An information-theoretic model for steganography. In Proc of the International Workshop on Information Hiding 1525:306–318. https://doi.org/10.1007/3-540-49380-8_21
Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. The Imaging Science Journal 58:177–185. https://doi.org/10.1179/136821910X12651933390629
Coşkun İ, Akar F, Çetìn Ö (2013) A new digital image steganography algorithm based on visible wavelength. Turk J Electr Eng Comput Sci 21:548–564. https://doi.org/10.3906/elk-1108-74
Darji AD, Lad TC, Merchant SN, Chandorkar AN (2013) Watermarking hardware based on wavelet coefficients quantization method. Circuits, Systems, and Signal Processing 32:2559–2579. https://doi.org/10.1007/s00034-013-9550-2
Das S, Maity R, Maity NP (2018) VLSI-based pipeline architecture for reversible image watermarking by difference expansion with high-level synthesis approach. Circuits, Systems, and Signal Processing 37:1575–1593. https://doi.org/10.1007/s00034-018-0979-1
Dixit A, Dixit R (2017) A review on digital image watermarking techniques. International Journal of Image, Graphics & Signal Processing 9:56–66. https://doi.org/10.5815/ijigsp.2017.04.07
Dogan S (2017) A reversible data hiding scheme based on graph neighbourhood degree. Journal of Experimental & Theoretical Artificial Intelligence 29:741–753. https://doi.org/10.1080/0952813X.2016.1259264
Ghadi M, Laouamer L, Nana L, Pascu A (2018) A blind spatial domain-based image watermarking using texture analysis and association rules mining. Multimed Tools Appl:1–46. https://doi.org/10.1007/s11042-018-6851-2
Hazra S, Ghosh S, De S, Rahaman H (2018) FPGA implementation of semi-fragile reversible watermarking by histogram bin shifting in real time. J Real-Time Image Proc 14:193–221. https://doi.org/10.1007/s11554-017-0672-9
Image Database: http://www.io.csic.es/PagsPers/JPortilla/image-processing/bls-gsm/63-test-images. Accessed 02 July 2017.
Kim C, Shin D, Leng L, Yang C-N (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101–114. https://doi.org/10.1007/s11554-016-0641-8
Lin SL, Huang CF, Liou MH, Chen CY (2013) Improving histogram-based reversible information hiding by an optimal weight-based prediction scheme. Journal of Information Hiding and Multimedia Signal Processing 4:19–33
Lo CC, Hu YC, Chen WL, Wu CM (2014) Reversible data hiding scheme for BTC-compressed images based on histogram shifting. International Journal of Security and Its Applications 8:301–314. https://doi.org/10.14257/ijsia.2014.8.2.31
Maity SP, Kundu MK (2013) Distortion free image-in-image communication with implementation in FPGA. AEU-International Journal of Electronics and Communication 67:438–447. https://doi.org/10.1016/j.aeue.2012.10.014
Maity HK, Maity SP (2014) FPGA implementation of reversible watermarking in digital image using reversible contrast mapping. The Journal of Systems and Software 96:93–104. https://doi.org/10.1016/j.jss.2014.05.079
Maity HK, Maity SP, Delpha C (2013) A modified RCM for reversible watermarking with FPGA implementation. In Proc. of 4th European workshop on visual information processing. 100–105.
Mandal H, Phadikar A, Maity GK, Chiu TL (2018) FPGA based low power hardware for quality access control of compressed greyscale image. Microsyst Technol:1–14. https://doi.org/10.1007/s00542-018-3817-2
Mohanty SP, Kougianos E, Ranganathan N (2007) VLSI architecture and chip for combined invisible robust and fragile watermarking. IET Comput Digit Tech 1:600–611. https://doi.org/10.1049/iet-cdt:20070057
Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24. https://doi.org/10.1016/j.dsp.2016.02.005
Pexaras K, Tsiourakis C, Karybali IG, Kalligeros E (2017) Optimization and hardware implementation of image watermarking for low cost applications. In Proc. of the 24th IEEE international conference on electronics, circuits, and systems 347–350. https://doi.org/10.1109/ICECS.2017.8292014
Phadikar A, Maity GK, Chiu TL, Mandal H (2019) FPGA implementation of lifting-based data hiding scheme for efficient quality access control of images. Circuits, Systems, and Signal Processing 38:847–873. https://doi.org/10.1007/s00034-018-0893-6
Phadikar A, Maity SP, Mandal MK (2008) Quantization based data hiding scheme for quality access control of images. In Proc. of the 12th IASTED international Conference on Internet and Multimedia Systems and Applications. 113-118
Phadikar A, Mandal H, Maity G, Chiu TL (2015) A new model of QIM data hiding for quality access control of digital image. IEEE International Conference on Soft-Computing and Networks Security:1–5. https://doi.org/10.1109/ICSNS.2015.7292441
Souici I, Seridi H, Akdag H (2011) Images encryption by the use of evolutionary algorithms. Analog Integr Circ Sig Process 69:49–58. https://doi.org/10.1007/s10470-011-9627-4
Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22:91–106. https://doi.org/10.1007/s00500-017-2489-7
Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7:297–306. https://doi.org/10.1007/s11760-011-0238-4
Terchi Y, Bouguezel S (2018) A blind audio watermarking technique based on a parametric quantization index modulation. Multimed Tools Appl 77:25681–25708. https://doi.org/10.1007/s11042-018-5813-z
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13:1–14
Weng S, Pan JS, Gao X (2012) Reversible watermark combining pre-processing operation and histogram shifting. Journal of Information Hiding and Multimedia Signal Processing 3:320–326
Acknowledgments
This study was supported by the Ministry of Science and Technology (MOST), Taiwan R.O.C., under grant number MOST 107-3113-E-155-001-CC2,106-3113-E-155-001-CC2, 106-2221-E-155-036, 105-3113-E-155-001, 104-3113-E-155-001, 103-3113-E-155-001, 103-2221-E-155-028-MY3.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Phadikar, A., Mandal, H. & Chiu, TL. A novel QIM data hiding scheme and its hardware implementation using FPGA for quality access control of digital image. Multimed Tools Appl 79, 12507–12532 (2020). https://doi.org/10.1007/s11042-019-08392-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08392-5