Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Reversible integer wavelet transform for blind image hiding method

  • Nazeer Muhammad ,

    nazeer@hanyang.ac.kr

    Affiliation Department of Mathematics, COMSATS Institute of Information Technology, Wah Cantt., Pakistan

  • Nargis Bibi,

    Affiliation Department of Computer Science, Fatima Jinnah Women University, Rawalpindi, Pakistan

  • Zahid Mahmood,

    Affiliation Department of Electrical Engineering, COMSATS Institute of Information Technology, Abbotabad, Pakistan

  • Tallha Akram,

    Affiliation Department of Electrical Engineering, COMSATS Institute of Information Technology, Wah Cantt., Pakistan

  • Syed Rameez Naqvi

    Affiliation Department of Electrical Engineering, COMSATS Institute of Information Technology, Wah Cantt., Pakistan

Abstract

In this article, a blind data hiding reversible methodology to embed the secret data for hiding purpose into cover image is proposed. The key advantage of this research work is to resolve the privacy and secrecy issues raised during the data transmission over the internet. Firstly, data is decomposed into sub-bands using the integer wavelets. For decomposition, the Fresnelet transform is utilized which encrypts the secret data by choosing a unique key parameter to construct a dummy pattern. The dummy pattern is then embedded into an approximated sub-band of the cover image. Our proposed method reveals high-capacity and great imperceptibility of the secret embedded data. With the utilization of family of integer wavelets, the proposed novel approach becomes more efficient for hiding and retrieving process. It retrieved the secret hidden data from the embedded data blindly, without the requirement of original cover image.

Introduction

Blind data hiding is a vibrant issue of Internet communications which is frequently used for sending, receiving, or storing the secret information [1]. As the number of secrets retained via internet are upsurged, the demand for the fortification from frequent embezzlement is increased dramatically, which results in the fictitious propaganda. The images are susceptible to imperceptible alterations by the common user observations. An effective way to overcome the unpredictability is to encrypt the meaningful secret data into a meaningless dummy data. The subsequent dummy data can be implicit by those individuals only who know the distinct key parameters for yielding to candid form with complete sequence of accurate algorithm. Secret encryption permits secure authentications and data confidentiality. For secret digital information handling, it is significant to hide secret digital message into some cover image so that it does not disclose unique subjects [2].

Digital data hiding methods can be considered as reversible, irreversible, blind, or non-blind, respectively [2]. Reversible methods are used to restore the original cover image from embedded data by retrieving the hidden secrets. In irreversible technique, once the secret data is concealed into the original cover image, it results in the lost of original cover which cannot be recovered at the retrieving stages from the embedded media [3]. In military and medical image processing, images are collected at an expensive price and are repeatedly subjected to additional treating, such as massive magnification and interpolation [4]. Any alteration may hamper analysis of the digital image [5]. Another benefit of the reversible data hiding is that access to unique contents of the expensive images can be controlled.

In the blind data hiding method, embedding the secret data can be detected from the embedded cover image without admittance of the original cover image. However, an original cover image is required during detection phase of the non-blind data hiding method. However, the blind detection has wider applicability because ease of the original cover data is not always available at retrieving end. However, it is not realistic assumption to use the common image as a cover data, since the cover image and the hidden data of the secret image cannot be surely detached from the communicated data at the detecting end [6].

It has been determined that two key aspects are affecting the secret data hiding process: (1) The amount of the hiding capacity (or payload) and the visual eminence of the embedded images [7]. The first factor, a secret data hiding method with slight data adjustment is more protected than that with considerable (high) adjustment since it does not increase any inconsistency of modified cover data. (2) Hiding capacity of cover data with high payload is desired because a large amount of private and personal data can be capably conveyed for a number of scenarios, such as intelligence agencies, defense, military, and health organizations [8]. The proposed method’s significant contributions are as follows:

  • This paper focuses on the reversible blind data hiding method to increase the privacy and security by assimilating both cryptography and steganography with efficient hiding and detecting processes for the large secret data.
  • The proposed technique utilizes Fresnelet transform to achieve a meaningless dummy data of the meaningful secret image data [9]. Consequently, copyrights protection of secret hiding data contents may be performed using the Fresnelet transform [10]. The application of the Fresnelet transform may be acclaimed for multifaceted encryption processes to deliver more reliability and security. Moreover, using the Fresnelet transform, secret data detected from an embedded image can be acquired with high resolution [11].
  • Fresnelet transform basis are yielding robust parameters to attain a multi-scale spreading of secret hiding data to establish the key features of the proposed method for privacy and security. It is not possible to achieve the hidden secret message secret hiding data deprived of the accurate key parameters.
  • The proposed method considers the integer wavelet transform (WT) reversibility property. The secret hiding data can be embedded into a resized approximated cover image which is produced from the input original image using WT transform [12]. So, the approximated image can be reversibly reinstated from an embedded data and the secret hiding data.

The rest of this paper is organized as follows. The nomenclature of important expression is stated in Table 1. The Fresnelet transform based encryption is explained in the next section. The subsequent section describes the reversible blind data hiding method. Then the detailed results evaluation is presented. In the last section the conclusions are drawn.

Data encryption process

An approximation model of the diffraction phenomena is developed using the convolution integral through the complex waves propagation [1315]. The with 1-D case can be expressed for a function as the follows: (1) where τ > 0 is the normalizing parameter depending on the wavelength λ and the distance d as follow: (2)

The is applied to a wavelet basis [16] and new bases for multi-resolution analysis are obtained [11]. The new bases have been used for digital holograms reconstruction with important parameters: propagating distance, resolution scale, and wavelength, respectively, between image and object plane [11]. The with 2-D case is achieved by using the tensor product in terms 1-D kernel kτ(x). Therefore, for , (3) Since the kernel Kτ(x, y) is separable, the with 1-D is freely expanded to 2-D case. Various useful properties of the can be explained [11]. Among the prominent ones is the unitary property [11]. It facilitates the to perfect reconstruction of a given data f as follows: (4) The wavelet of 1-D case can be also applied though separable extension to obtain the wavelet of 2-D case [17]. The wavelet transform generated by wavelets with two parameter family is applied on as convolution integrals, which also defines the Riesz basis for , where (5) The Haar wavelet that produces an orthonormal basis for is considered as a simplest form of a wavelet. This wavelet is used to achieve the perfect reconstruction and multi-resolution analysis of the data as well [18]. The detail features of the wavelet transforms are well explained in [19]. The basis of wavelet transform is used to define the Fresnelet basis with the , as follows: (6) With an orthogonal wavelet basis , an orthonormal Fresnelet basis are generated. In this regards, for the fixed value of τ, by allowing , we have attained the following Fresnelet decomposition: (7) The coefficients cj,l in Eq (5) are known as the Fresnelet coefficients. Using the separable nature of the Fresnelet transform, the Fresnelet transform with 1-D case can be extended to 2-D case. In this way, the tensor product with four combinations for establishing the approximate, horizontal, vertical, and diagonal sub-bands, respectively, as follow: (8) (9) (10) (11) where a low-pass filter is generated by the Eq (8) and high-pass filters are generated by Eqs (9)–(11). Four types of the Fresnelet coefficients are achieved by applying the basis functions above to data f: The coefficient represents the low-passed data and the coefficients , , and , are high-passed detail data. The Fresnelet coefficients of the secret data are revealed in Fig 1. Instead of the simple (typically derived for digital off-axis hologram reconstruction) [12], it is worth revealing in Fig 1, that the forward Fresnelet transform can be used to process the meaningful information into dummy (encrypted) data with four different sub-bands. This data is totally encrypted. These four sub-bands in the set-up of complex data are shown in Fig 2. The inverse of the Fresnelet coefficients , , , and can be obtained using the tensor product as follows: Where inverse Fresnelet transform, is also equivalent to inverse of integer wavelet transform. This provide the original function f using the following expression. (12) where j = 0, represents the reconstruction scale same as before decomposition process: propagating waves comes back to their original position. The magnitudes of secret data of the Bridge image is obtained using the Fresnelet coefficients as shown in Fig 2. Note that a reconstruction of a secret data using the unitary property of the Fresnelet transformation is attained using the forward Fresnelet transform. The reconstruction results have complex data. In Fig 1, the first row shows the coded secret data of Bridge image. Moreover, input image, Lena, Peppers, Boat, Airplane, and Mandrill are considered as a cover information. These are obtained from standard bench mark images of SIPI image database (University of Southern California). The Bridge image is propagated using the Fresnelet transform with the distance parameter d1 = 1m. The noticeable areas with dotted lines of the corresponding images in the first row are representing in the second row (zoomed-in views). First figure in second row of Fig 2 is demonstrating the inverse propagation of the corresponding sub-band data of the first row

thumbnail
Fig 1. Fresnelet transformed decomposition of the secret data of Bridge image with key parameter d1 = 1m.

(A) approximation data, (B) the horizontal detail data, (C) the vertical detail data, (D) the diagonal detail data, (E) zoomed-in view of approximation data, (F) zoomed-in view of horizontal detail data, (G) zoomed-in view of vertical detail data, and (H) zoomed-in view of diagonal detail data.

https://doi.org/10.1371/journal.pone.0176979.g001

thumbnail
Fig 2. Fresnelet transformed encryption application.

(A) The corresponding approximation data obtained from the Fresnelet transformed application on the Fig 1A with key parameter d2 = 10−4 m, (B) the corresponding horizontal detail data obtained from the Fresnelet transformed application on the Fig 1B, (C) the corresponding vertical detail data obtained from the Fresnelet transformed application on the Fig 1C, (D) the corresponding diagonal detail data obtained from the Fresnelet transformed application on the Fig 1D, (E) the magnitude of complex valued scrambled data, (F) the real part of the scrambled data, (G) the imaginary part of the scrambled data, (H) the reconstructed image using the inverse Fresnelet transform process from the real part and the imaginary part of the scrambled data.

https://doi.org/10.1371/journal.pone.0176979.g002

Data hiding process

In the proposed method, we apply the WT for decomposing and reconstructing the cover image. The lifting framework [20] is used to perform the integer wavelet transform that has low storage cost without extensive complexity of computation. In numerical simulation, the integer Haar wavelet transform is used for decomposing and reconstruction of the cover image. The data hiding proposed method is comprised on two steps: embedding process and retrieving process.

The embedding process

The two phases are involved in the embedding process. In the first, the encryption of the secret data is performed and in the second, the cover image is decomposed in which the encryption from the secret data is embedded. To preserve confidential information, secret image is decomposed based on the Haar wavelet using the Fresnelet transform. At first, the secret data f is transformed using the Fτ with the initial distance parameter key, d1 = 1m, as follow: (13)

At second, a scrambled data D is generated from the decomposed data of f via the inverse Fresnelet transform IFτ on using the subsequent distance parameter key, d2 = 10−4 m, as follow: The encrypted data is obtained from the Bridge secret data as shown in Fig 2. We use the Bridge secret data as an information image which is taken from SIPI image database, University of Southern California: http://sipi.usc.edu/database/database.php (Volume 3: Miscellaneous). The nature of the encrypted data are complex valued because of the Fresnelet transform application [12]. This complex data can be separated into the real part and the imaginary part: Dre and Dim. The embedding of those parts are made into suitable sub-band (detail parts) of the decomposed cover image as shown in Eqs (15) and (16). The integer wavelet transform is employed on a cover image S, for obtaining the sub-bands data in which the encrypted secret data for hiding purpose in detail parts will be embedded. Prior to use a cover image S, we consider an input image C (standard benchmark images). The one level decomposition is performed on C At the coarser resolution level j-1 (where j be the finest resolution level), four sub-band images are attained as follows: The C is transformed to an approximated data on employing the low-pass wavelet filter along its rows and columns. The C is transformed to a horizontally oriented detail data on employing the low-pass wavelet filter along its rows and high-pass wavelet filter along its columns. The C is transformed to a vertically oriented detail data on employing the high-pass wavelet filter along its rows and low-pass wavelet filter along its columns. Similarly, the C is transformed to a detailed data on employing the high-pass wavelet filter along its rows and columns. Notice that the low-pass sub-band approximated data is containing high energy. The approximated data obtained using the WT is considered as an original image I in our proposed method and all high-passed details , , and are discarded. We scale I twice to its size using bi-cubic interpolation and obtain the resized data S. This resized data S is considered as the cover image and decomposed into four sub-bands using the WT. The decomposition of the S is providing us the sub-band data: the low-passed data , the horizontal detail data , the vertical detail data , and the diagonal detail data , respectively. The detail sub-band data coefficients are corresponding to edges, corners, and textures, respectively. These are robust in nature and easily can adjust the secret data for embedding purpose [3]. Moreover, in most of the images, the high frequency coefficients of WT follow Laplacian-like distribution are suitable for data hiding [21]. So, we embed the encrypted secret data into the and . The real part Dre of the encrypted data is embedded into the , whereas the imaginary part Dim of the encrypted data is embedded into the as Eqs (15) and (16). A scale parameter α is introduced that controls the weight of embedding of encrypted secret data as a strength factor as shown in Eq (14). Its values lie between 0 and 1, depend on low-passed data of cover image and normalizing agent Γ. We choose value of Γ = 0.075 following the [18] to produce α as follows: (14) (15) (16) where and are the adapted detail data containing the encrypted secret data. During the reconstruction process, we use the original image I as a replacement for the resized data . This is used for attaining high imperceptibility and a reliable retrieving of the encrypted data from the embedded information as discussed in Section. (17)

On embedding the imaginary and the real parts of D in the definite details of S, an inverse integer wavelet transform (IWT) is employed in the above reconstruction process that produces an information embedded image E as shown in Eq (17).

The retrieving process

The reverse of the embedding process is the retrieving process as shown in Fig 3(B). At first, we decompose the information embedded image E into , , , and , respectively, on using the IWT. Notice that the approximated data is the original image I as used in Eq (17). The high frequency sub-band data , , and are detailed data sets of E that are preserved the information in the and . Bi-cubic interpolation is used for resizing the low-pass approximated sub-band data with the equal size as that of the E to obtain the resized data Er. Er is decomposed further using the WT for retrieving the embedded secret data. Then we get the , , , and , respectively. The encrypted data (in form of imaginary and real parts) are extracted using the high detail data and by subtracting from the data and of the information embedded data, respectively. Moreover, for obtaining encrypted secret data, the output of the difference data are divided by α. The extraction of the encrypted imaginary and real parts are unified in the form of complex data. Furthermore, an inverse Fresnelet transforms is used to this complex encrypted data with the same key parameter in order to provide a meaningful secret data.

thumbnail
Fig 3. The proposed method processing in flow-chart.

(A) the embedding and (B) the retrieving.

https://doi.org/10.1371/journal.pone.0176979.g003

Reversible criteria of the proposed method

In proposed method embedding and retrieving processes are performed in WT domain. Recall that the integer wavelet transform is mapped integers to integers. In the lifting scheme, it is particularly useful for supporting the lossless reproduction of an original image [20]-[26]. Note that the lifting scheme for WT is realized by its filter banks known as uniformly maximally decimated. These filter banks are carrying out the ladder networks to execute the polyphase filtering [20, 27]. Even in the existence of quantization error such networks can be acted invertible, especially, the rounding error is generated by using the finite-precision arithmetic (see supporting information S1 File)-Appendix. We refer, for instance, to [20] for further details.

The proposed method employs the Haar wavelet filter to the integer sort of the lifting scheme which as follows:

Decomposition transform.

Reconstruction transform.

where ζj,i and ϑj,i are the ith components of low and high sub band wavelet coefficients at the jth level, respectively [20]. Also, ⌊•⌋ is a floor operation, which is an integer kind of the linear wavelet transform that holds the rounding error identity.

Rounding error identity

Where , s ∈ z and , t ∈ z where t = o, the subsequent identity holds: (18)

Proof.

Let t ≠ 0, the function that satisfies the relationships is the mod function as follows:

  1. mod(s, t) = s, for 0 ≤ st − 1.
  2. mod(s + t, t) = mod(s, t).

Furthermore, it can be observed from the above mentioned two properties (19) where , the floor function ⌊β⌋ denotes the leading integer, and the ceiling function ⌈β⌉ represents the least integer. For all , it can be shown for the ceiling and floor functions: (20) From [20] we note 0 ≤ frac β ≤ 1, where , . The mod function is defined as (21) where the mod function calculates the nonnegative remainder values such that s is divided by t. From Eqs (20) and (21), we deduce the following identity (22) (23) Now we consider the right-hand side Eq (18) to further manipulate Eq (22) as follows: (24) From Eqs (21)–(23), we can deduce the following expression: (25) Therefore, the identity given in Eq (18) holds. The identity given in Eq (24) allows us to implement the ceiling of a quotient which is practically useful in terms of the floor of a quotient and vice versa.

Overflow and underflow Issue

On embedding the secret image into coefficients of the high frequency using Eqs (15) and (16), it is possible that the 8-bit gray scale values in the entrenched image to some of pixels may go above the upper bound value 255 and/or the lower bound value 0 after inverse WT [22]. This is referred to as overflow/underflow. The overflow/underflow problem can be minimized by considering the lossless recovery of an original cover image at the retrieving phase. To prevent this, the common method adopts the histogram modification by creating bookkeeping data [23]. The bookkeeping data technique, however, reduces the capacity of the cover image for embedding secret data as well as increases the computational complexities of the embedding process [24]. The capacity of payload (secret data) in embedded image is defined as the ratio between the numbers of bits (embedded data) to the per pixels of cover image can be expressed as follows: (26) where q represents the quantization level qi; i, …, N and M2 is the size of cover image where secret data to be embedded. To overcome overflow/underflow issues as well as the capacity and computational complexity issues, the integer wavelet transform method can also be employed. In fact, the invertibility of the lifting scheme for the wavelet transform can resolve those issues [20]. Suppose that the resized cover image S is transformed by the WT in the embedding process. Consider the embedded image E generated by applying the inverse WT with high sub-band data , , and along with the original image I as Eq (17). It can be deduced from Eq (17) that (27) This shows that underflow/overflow is solely dependent on the errors , , and . These errors are caused by the high sub band data generation and the embedded dummy data Dre and Dim. Since WT lifting scheme involves in the truncations of , , and data only during the lifting steps, the rounding off error is unavoidable. So, the rounding off error may be developed in the high sub-band data. However, it does not affect the original image data I in Fig 3. Therefore, the reconstruction of an original cover image can be performed without any misrepresentation due to the reversible nature of the lifting scheme for integer wavelet transform.

Simulation and evaluation

At the first stage, the Peak Signal-to-Noise Ratio (PSNR) a very well-known metric is measured for analyzing the image value of the resized and the embedded images as shown in Table 2.

thumbnail
Table 2. Performance comparisons of resizing image (cover image) quality on PSNR (dB) values.

https://doi.org/10.1371/journal.pone.0176979.t002

At later stage, a secret data set with size N × N is embedded into a cover image of size M × M with N = 256 and M = 512. In the proposed method, we consider the Fresnelet transform propagation is performed at: wavelenght λ = 632.8 nm, a sampling interval size of a CCD plane Δ = 10 nm and distances d1 = 1m and d2 = 10−4 m [11]. The Fresnelet transform operations with these parameters are employed for the embedding and retrieving phases.

The carrying capacity of the information embedded images is estimated in terms of payload using the measurement of criteria in terms of bits per pixel (bpp). In Fig 4A–4D, the quality of the information embedded images is estimated in terms of PSNR (dB) is measured from an input image and embedded image [23]. In Table 3, the simulation outcomes of the proposed method are shown the Payload (bpp) values of the secret data capacity in Lena, Airplane, Mandril, and Peppers, respectively (a set of benchmark images) embedded images for comparing our proposed method with the watermarking method [24] and the interpolation based data hiding method [25]. In Fig 4E–4H, the lossless recovery of the input images are obtained with high imperceptibility. The corresponding extraction of secret images from embedded images Fig 4E–4H are shown with high accuracy in Fig 5A–5D. We empirically evaluate the choice of the strength factor based on the numerical simulation. Since the different values of α is acting as a weighting strength factor for the secret data, within the range of 0 to 1 are regulating the quality of the embedded image and value of the Payloads (bpp) of the extracted data. Note that with an increase in the value of the strength factor, the Payloads of the extracted data is increased and PNSR of embedded images is decreased and vice versa. In terms of payload, Table 3 shows that the proposed method is performed better than the [25], significantly. The scheme [25] was specially designed for interpolation based data hiding purpose. On the other hand, the method [24] was developed for watermarking purpose that carried only small amount of information in terms of ownership authentication [23]. Graphical demonstrations of the proposed method in terms of the embedding capacity with recent existing techniques are shown in Fig 6. Moreover, the proposed method delivers the improved imperceptibility of the embedded data along with large capacity values (the capacity size in bits [7]) as compared with recent existing methods as revealed in Table 4 and Fig 6. Note that the from Table 4 and Fig 6, it is clear that the proposed method offers higher embedding capacity than other existing methods. In Tables 3 and 4, there is a main reason for the higher PSNR values of the embedded image for the references [24, 28] as compare to our proposed method. Those methods [24, 28] are based on the non-blind data hiding schemes, where the information of the original cover image is demanded to be required to extract the embedded data, accurately. Note that in a non-blind data hiding method, embedding process can be optimally designed, so does to maintain the good quality of the information embedded data at the cost of less-capacity for embedding the secret data. On the other hand, in a blind data hiding method, embedding process is defined in such a way, so does to retrieve the embedded information without using of any clue from the original or cover image. However, in this case, the information embedded data has fairly lower quality as compared with the non-blind data hiding method. Furthermore, in our proposed method, due to the diffusion process of the Fresnelet transform application to the secret data, we can generate an encrypted data with coded pattern which has almost uniformly scattered structure, as discussed in [9]. This effect is justified in Fig 2. This pattern which would be embedded to a cover image is useful for keeping higher embedding capacity of secret data.

thumbnail
Fig 4. The secret embedded images (carrying secret image Bridge) and recovered input images (lossless recovery after extraction of the secret image).

(A) Embedded image Lena (PSNR = 33.56), (B) embedded image Airplane (PSNR = 31.07), (C) embedded image Mandrill (PSNR = 29.97), (D) embedded image Peppers (PSNR = 23.89), (E) recovered input image Lena, (F) recovered input image Airplane, (G) recovered input image Mandrill, and (H) recovered input image Peppers.

https://doi.org/10.1371/journal.pone.0176979.g004

thumbnail
Table 3. Performance comparisons of the PSNR and Payload in [24], [25] and the proposed method.

https://doi.org/10.1371/journal.pone.0176979.t003

thumbnail
Fig 5. Extracted secret data (Bridge).

(A) Extracted secret data from embedded image Lena, (B) extracted secret data from embedded image Airplane, (C) extracted secret data from embedded image Mandrill, and (D) extracted secret data from embedded image Peppers.

https://doi.org/10.1371/journal.pone.0176979.g005

thumbnail
Fig 6. Graphical demonstration of the comparison of Table 4.

(A) Capacity carried by Lena, (B) capacity carried by Airplane, (C) capacity carried by Boat, and (D) capacity carried by Mandrill. (Images information is given in Data Availability Statement.)

https://doi.org/10.1371/journal.pone.0176979.g006

thumbnail
Table 4. Comparison of the quality of embedded images and the capacity of embedded secret data.

https://doi.org/10.1371/journal.pone.0176979.t004

While, for most of other existing techniques [24, 25, 32], the secret data with low-capacity is considered to be hidden in a cover image without any diffusion process as shown in Tables 3, 4 and Fig 6, respectively. Ever since it is not possible to achieve the robustness or imperceptiveness of the secret embedded data and the capacity of the secret image simultaneously. However, to maximize, an adequate balance of these features would be prepared for a specific application [24, 25, 29]. For example, a secret data hiding method would forgo the robustness in favor of the higher capacity and low imperceptibility. On the other hand, an invisible watermarking method may not require large capacity of a watermark, would certainly favor of the higher imperceptibility in terms of the robustness of the cover image [24], which is demonstrated in Fig 6.

Conclusion

In this work, a blind data hiding with twofold contributions is presented for secret data to handle substantially reversible approach and preserve latent detail information of retrieved-secret-data at extraction phase. At first stage, Fresnelet transform is employed for encrypting the secret data in the form of dummy complex data to be embedded in the cover image. Then the secret data and the original image were retrieved blindly and reversibly in the retrieving phase without the original cover image. Therefore, the proposed framework benefits from Fresnelet transform multi-resolution properties. Its performance in terms of quantitative quality was compared with recent state-of-the-art methods. The experimental results substantiate that it performs better than the listed algorithms and maintains excellent capacity for secret data hiding and can be used for achieving reasonable perceptual transparency of an image data. Towards this end, an anticipate to develop reversible data hiding algorithm for video encryption with desired improvements will be the subject of a future study.

Supporting information

Author Contributions

  1. Conceptualization: NM NB.
  2. Data curation: NM NB ZM SRN.
  3. Formal analysis: NM NB ZM TA.
  4. Funding acquisition: NM.
  5. Investigation: NM NB ZM TA SRN.
  6. Methodology: NM NB.
  7. Project administration: NM.
  8. Resources: NM.
  9. Software: NM NB.
  10. Supervision: NM.
  11. Validation: ZM TA SRN.
  12. Visualization: NM NB ZM TA SRN.
  13. Writing – original draft: NM NB.
  14. Writing – review & editing: NM NB ZM TA SRN.

References

  1. 1. Zaidan B, Zaidan A, Al-Frajat A, Jalab H. On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences. 2010;10:1650–5.
  2. 2. Wu H-C, Wu N-I, Tsai C-S, Hwang M-S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings-Vision, Image and Signal Processing. 2005;152(5):611–5.
  3. 3. Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z. Reversible data hiding using integer wavelet transform and companding technique. Digital Watermarking: Springer; 2005. p. 115–24.
  4. 4. Lee S, Yoo CD, Kalker T. Reversible image watermarking based on integer-to-integer wavelet transform. Information Forensics and Security, IEEE Transactions on. 2007;2(3):321–30.
  5. 5. Muhammad N, Bibi N, Jahangir A, Mahmood Z. Image denoising with norm weighted fusion estimators. Pattern Analysis and Applications. 2017:1–10.
  6. 6. Pan J-S, Huang H-C, Jain LC. Information hiding and applications: Springer; 2009.
  7. 7. Chih-Yang L, Chang C-C, Yu-Zheng W. Reversible steganographic method with high payload for JPEG images. IEICE transactions on information and systems. 2008;91(3):836–45.
  8. 8. Anand D, Niranjan U, editors. Watermarking medical images with patient information. Engineering in Medicine and Biology Society, 1998 Proceedings of the 20th Annual International Conference of the IEEE; 1998.
  9. 9. Muhammad N, Nargis B, Malik YM, Kim D-G. A Fresnelet-Based Encryption of Medical Images using Arnold Transform. International Journal of Advanced Computer Science and Applications, 2013. p.131–40.
  10. 10. Liebling M, Unser M. Autofocus for digital Fresnel holograms by use of a Fresnelet-sparsity criterion. JOSA A. 2004;21(12):2424–30. pmid:15603081
  11. 11. Muhammad N, Nargis B, Zahid M, Kim D-G, Blind data hiding technique using the Fresnelet transform. SpringerPlus. 2015;4(1):1–15.
  12. 12. Muhammad N and Kim D-G, Resolution Enhancement for Digital Off-Axis Hologram Reconstruction. IAENG Transactions on Engineering Technologies: Springer; 2013. p. 431–43.
  13. 13. Muhammad N and Kim D-G, A simple approach for large size digital off-axis hologram reconstruction. World Congress on Engineering. Vol. 2. 2012.
  14. 14. Muhammad N and Kim D-G, A novel Fresnlet based robust data hiding algorithm for medical images, 2012 IEEE International Conference on Imaging Systems and Techniques Proceedings, 2012, pp. 213–216.
  15. 15. Muhammad N and Kim D-G, An Efficient Data Hiding Technique in Frequency domain by using Fresnelet Basis. World Congress on Engineering. Vol. 2. 2012
  16. 16. Muhammad N, Nargis B. Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Processing, 2015;9(9):795–803.
  17. 17. Bushra M, Muhammad N, Muhammad S, Tanzila S, Amjad R. Extraction of breast border and removal of pectoral muscle in wavelet domain. Biomedical Research-ind 2017;28(10): 1–3.
  18. 18. Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z. Digital watermarking using Hall property image decomposition method. Pattern Analysis and Applications. 2017:1–16.
  19. 19. Mallat S. A wavelet tour of signal processing: the sparse way: Access Online via Elsevier; 2008.19.
  20. 20. Adams MD. Reversible integer-to-integer wavelet transforms for image coding: University of British Columbia; 2002.
  21. 21. Sweldens W. The lifting scheme: A construction of second generation wavelets. SIAM Journal on Mathematical Analysis. 1998;29(2):511–46.
  22. 22. Wang S-Y, Li C-Y, Kuo W-C. Reversible data hiding based on two-dimensional prediction errors. IET image processing. 2013;7(9):805–16.
  23. 23. Yang C-H, Tsai M-H. Improving histogram-based reversible data hiding by interleaving predictions. IET image processing. 2010;4(4):223–34.
  24. 24. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ. Reversible watermarking algorithm using sorting and prediction. Circuits and Systems for Video Technology, IEEE Transactions on. 2009;19(7):989–99.
  25. 25. Jung K-H, Yoo K-Y. Data hiding method using image interpolation. Computer Standards and Interfaces. 2009;31(2):465–70.
  26. 26. Chang C-C, Lin C-C, Tseng C-S, Tai W-L. Reversible hiding in DCT-based compressed images. Information Sciences. 2007;177(13):2768–86.
  27. 27. Olkkonen H, Olkkonen J, Pesola P. Efficient lifting wavelet transform for microprocessor and VLSI applications. Signal Processing Letters, IEEE. 2005;12(2):120–2.
  28. 28. Lin C-C, Shiu P-F. High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing. 2010;1(3):220–40.
  29. 29. Lin C-C, Shiu P-F. DCT-based reversible data hiding scheme. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication; 2009: ACM.
  30. 30. Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. Information Forensics and Security, IEEE Transactions on. 2010;5(1):187–93.
  31. 31. Peng F, Li X, Yang B. Adaptive reversible data hiding scheme based on integer transform. Signal Processing. 2012;92(1):54–62.
  32. 32. Wang C, Li X, Yang B, editors. High capacity reversible image watermarking based on integer transform. Image Processing (ICIP), 2010 17th IEEE International Conference, 2010.