

A Robust Hybrid DWT-DCT and Up-sampling Approach for Multiple Image Hiding
Abstract
The task of multi-image hiding involves embedding several confidential images within a single cover image such that the camouflage-image remains visually indistinguishable from the original, and all confidential images can be perfectly reconstructed. In this paper, we propose a novel hybrid image steganography method that combines DWT-DCT-based preprocessing and a high-ratio up-sampling mechanism with a spatial-domain reversible embedding scheme. First, a dummy embedding is performed using the Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) on the interpolated pixels of an 8x up-sampled cover image. This step acts as a visual smoothing mechanism to improve the fidelity of the embedding surface while maintaining PSNR ≈ ∞. Then, the actual embedding of multiple confidential images is performed using a block-based reversible data steganography method with Euclidean distance-guided block matching and pixel-level transformation. This combined approach ensures high steganography capacity, strong robustness, and perfect reconstruction of all confidential images. Experimental results demonstrate that the proposed method outperforms traditional image steganography schemes in terms of visual quality, imperceptibility, and reversibility, making it suitable for secure multimedia communication and sensitive data storage.
References
P. Ping, B. Guo, O. T. Bloh, Y. Mao, and F. Xu, "Hiding Multiple Images into a Single Image Using Up-Sampling," IEEE Transactions on Multimedia, vol. 26, pp. 1234–1247, 2024.[Online].Available:https://doi.org/10.1109/TMM.2023. 3322316.
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66, no. 3, pp. 357–372, 1998.
S. Zhang, X. Zhang, and K. Ren, “Secure and reversible data hiding in encrypted images for multiple data types,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 9, pp. 1629–1640, 2016.
H. Tang et al., “DeepMIH: Deep multiple image hiding,” in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, pp. 16432–16441.
X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012.
Y.-L. Lee and W.-H. Tsai, “A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 4, pp. 695– 703, Apr. 2014.
D. Hou, W. Zhang, and N. Yu, “Image camouflage by reversible image transformation,” J. Vis. Commun. Image Represent., vol. 40, pp. 225–236, Oct. 2016.
[9] P. Ping, J. Fu, Y. Mao, F. Xu, and J. Gao, “Meaningful encryption: Generating visually meaningful encrypted images by compressive sensing and reversible color transformation,” IEEE Access, vol. 7, pp. 170168–170184, 2019.
X. Chai, Z. Gan, Y. Chen, and Y. Zhang, “A visually secure image encryption scheme based on compressive sensing,” Signal Process., vol. 134, pp. 35–51, May 2017.
Refbacks
- There are currently no refbacks.