APP下载

Improving data hiding within colour images using hue component of HSV colour space

2022-04-06FatumaSaeidHassanAdnanGutub

Fatuma Saeid Hassan|Adnan Gutub

Computer Engineering Department,Umm Al-Qura University,Makkah, Saudi Arabia

Abstract Data hiding technologies aim to hide the existence of secret information within digital covers such as images by causing unnoticeable degradation to their quality.Reducing the image distortion and increasing the embedding capacity are the main points that the data hiding techniques revolved around.This article proposes two high payload embedding methods with high stego image quality using the Hue-Saturation-Value (HSV) colour model.The first method is hue-based embedding (HBE) that employs the H plane for hiding one or two bits in non-grey pixels.The second method uses the three HSV components, so it is called three-planes embedding (TPE).In TPE, one bit is hidden in the least significant bit (LSB) of V of the grey pixels, one or two bits in H of the pixels having low saturation or low brightness and one bit in the LSB of S otherwise.The experiments were conducted on 25 images and the results show that HBE hides more data on average than TPE with its quality reaching 60 dB.TPE achieves quality up to 61 dB and capacity reaches 364 Kb.TPE scores the highest capacity among six state-ofthe-art techniques in Red-Green-Blue,HSV,Hue-Saturation-Intensity and YCbCr spaces with the highest average peak signal to noise ratio midst five of them.By embedding 60,90, and 120 Kb, this TPE attains the best average quality amid all the methods.

1|INTRODUCTION

With the widespread use of the Internet, sensitive contents have become more exposed to penetration by intruders.Therefore, the data hiding technique, or as it is known as steganography[1],involves covert communication between the authorised parties who transmit the secret information.This process needs an embedding algorithm and a host object, like image [2], video [3] or text [4, 5], as its basic components to conceal the secret.Data hiding methods can be reversible or irreversible.Reversibility indicates the possibility of reshaping the exact carrier object once the message is retrieved, while irreversibility does not guarantee so [6].In either of the two types, the human visual system must be taken into consideration in order to not attract the attackers attention to the presence of secret data within the host media.This is because the better the imperceptibility property of the steganography method, the better its security.Additionally, the more amount of payload that the method can hide, the higher its capacity.Research studies that address the embedding within images use either the grayscale[7-9]or colour images.A hiding technique using grey images could be applied for colour images [10] but by repeating it in the three planes of the images independently[11],which means increasing the time-complexity.A better way for embedding into colour images is by using the techniques that are dedicated to this type of images.Colour-image steganography methods in the literature use different colour spaces such as Red-Green-Blue(RGB)[11-14],Hue-Saturation-Value(HSV) [15, 16], Hue-Saturation-Lightness (HSL) [17], Hue-Saturation-Intensity (HSI) [18, 19] and YCbCr [20, 21] that stands for luminance,chroma Blue difference and chroma Red difference.

RGB is the basic model in most display devices [22] in which the colour is represented as a combination of three primary colours:Red,Green and Blue.Mixing two full primary colours produces a secondary colour, so Red-Green is Yellow,Green-Blue is Cyan and Blue-Red is Magenta.Additionally,mixing one full primary colour with one secondary colour yields a tertiary colour, so there are six colours of this type.RGB is a correlated model because a small modification in one of its components influences the images quality [15]; so it is not the most suitable model for data hiding.Therefore,there is a need for studying the hiding using the other colour spaces,which are uncorrelated colour spaces, for the sake of improving the performance.Conversion between the RGB and the three hue-based colour models was given in [23].Also,converting RGB to YCbCr and vice versa was given in [20].

In each of the HSV,HSL and HSI colour spaces,hue is the colour's name, saturation is the colour's purity and the third component(value,lightness or intensity)is the colour's brightness.TheHplane has values between 0°and 360°where 0°is the same as 360°.TheSandIplanes are percentage values from 0%to 100%.WhenSis 0%,the grayscale values appear by varying the values of theVplane from 0%(Black)to 100%(White).In this case,the hue is undefined.Additionally,if the colour is Black then bothHandSare undefined.Only in the HSL model,HandSare also undefined if the colour is White.A close look at the hue plane shows that the primary,secondary and tertiary colours of the RGB model are separated by 30°in theHplane.Thus,they produce 12 basichues that are Red(at 0°or 360°),Red-Yellow(at 30°), Yellow (at 60°), Yellow-Green (at 90°), Green (at 120°),Green-Cyan(at 150°),Cyan(at 180°),Cyan-Blue(at 210°),Blue(at 240°), Blue-Magenta (at 270°), Magenta (at 300°) and Magenta-Red(at 330°).Therefore,an alteration in the value ofHmay change the perceived colour significantly[24],which makes the hue plane the least suitable plane for data embedding[17].On the other hand, a careful division of the hue values into clusters for data hiding decreases the chance of detecting the change by human eyes,as we propose in this article.

In the current work, we propose dual irreversible data hiding methods that utilise the hue plane of the HSV colour space for carrying data.The reason for choosing the HSV model among the HSL and HSI models is its efficiency [16]and its suitability for our data embedding methods, as proven by our experiments.We divide theHplane into groups depending on the 12 basic hues in order to maintain the quality of the images while increasing the hiding capacity.The first method uses only the hue component while the second one employs all the three planes of the HSV colour space for information concealing.

The rest of the article is organised as follows: The following section discusses a literature review of the existing irreversible data hiding techniques.A detailed description of the two proposed methods is given in Section 3.Section 4 analyses the experimental results of the methods.Finally, the conclusion of the article is given in Section 5.

2|LITERATURE REVIEW

In this section, we provide a brief discussion on some of the state-of-the-art techniques in the field of data hiding within colour images.The most common method is the least significant bit (LSB) substitution in which the LSB of the binary representation of each pixel in the image is replaced by a secret bit [14].The method can be stretched to increase the embedding capability by replacing more LSBs of the pixels,but this leads to more distortion in the image[14,25].Karim et al.[12]used the simple LSB substitution method to embed data in either the Green or Blue components of the pixels.In their method,the result of the XOR operation between one bit of a secret key and the LSB of the Red component determined the embedding plane in the pixel.This dependency on the secret key and the change in the embedding position improved the security of the simple LSB technique.The concept of Karim et al.'s method[12]was adopted in[14]but with adding several security barriers that involved permuting the image pixels,encrypting the secret key and encrypting the secret data.This method was not only highly secure but also computationally inexpensive.Muhammad et al.[18] investigated the utilisation of the LSB method for hiding data in the intensity channel of the HSI colour space.The reported results of their method showed more improvement in the image quality than Karim et al.[12].Another work that utilised theIplane and improved the imperceptibility of Karim et al.'s method was nominated by the authors in [19].Their work encoded the secret message using a three-level encryption algorithm.Then the image was scanned in a Morton manner to embed the cipher text by LSB substitution.To use the LSB method in the HSV colour space,the proposed technique in [15] divided the value plane into equal-sized blocks to embed the encrypted secret data into the positions specified by the magic matrix.We refer to this technique in this article as the HSV-MLSB.This technique achieved higher average visual quality than [18] when hiding the same amount of data in multiple cover images.The visual imperceptibility of the technique was better than the method in[25], which used the specificIchannel of the HSI model, that is,to hide the secret content with the help of the magic matrix,a proposed multi-level encryption algorithm and the LSB method were used.More image quality enhancement of the two methods in [18, 25] was achieved by the proposed technique in[16]that encrypted the sensitive data using an iterative magic matrix encryption algorithm.Then, the data was embedded in a scrambled version of theVplane of the HSV space using an adaptive LSB method.Three different keys were used in the method that made it very secure but increased the key exchange overhead.Kumar et al.[26]presented a selective embedding technique in the RGB images in which two conditions must be satisfied to utilise a pixel for embedding: the three components of the pixel have different values and the least component is less than the others by two values at minimum.The least component of each pixel that fulfilled the criteria was employed for concealing one secret bit using the LSB method.This technique produced very little distortion in the images.However, it could embed only a small size of payload due to the strict embedding criteria.Alwan et al.[20]proposed an LSB-based technique that used the YCbCr colour model in a way that improved the security of the basic LSB method.Their idea was to apply the XOR operation between one secret bit and the achromatic component of the pixel.Then,the result was again XORed with theCbcomponent to yield the bit that was to be finally embedded into the LSB of theCrchannel.The reported peak signal to noise ratio(PSNR)values of the method were more than 54 dB for all the images,which indicates the high quality of the images.

Gutub [13] presented a simple, secure and high-capacity data hiding method in which one of the RGB channels of a pixel was used to indicate the capability of the other two channels,which were called data holders, to embed two secret bits using LSB substitution.The first indicator channel was selected depending on the size of the secret message and the subsequent indicator channels were selected sequentially.Swain and Lenka [27] used a fixed indicator channel which was the maximum value summed for all the pixels.Their method encrypted the secret bits to add a second security layer to the pixel indicator technique in [13].Then, it hid four bits at maximum in one of the two data channels depending on predefined conditions.The authors reported a high PSNR value of 42.75 dB as the minimum visual quality of their high payload method.In Das and Kars method [28], the indicator channel was also used as a data holder and its information was embedded along with the encrypted secret data to be used in the extraction phase.Their method embedded two bits in the indicator channel and three bits in each of the other two channels, which increased the hiding capacity of [13].In Pandey et al.'s method [29], the indicator channel might also have been used for hiding data so that the embedding rate could reach 6 bits per pixel.Their method improved the embedding rate of Gutubs method[13], with high visual quality ranging from 48 to 71 dB when hiding 512 bytes of data.

Ioannidou et al.[30] took advantage of the idea that embedding in the edge pixels is more efficient than in the nonedge pixels in terms of the payload capacity and the visual quality.In comparison, the improvement in [31] proposed multibit assignment steganography for palette images,in which each gregarious colour that possesses close neighbouring colours in the palette is exploited to represent several secret bits,that is, replacing the original colour with a selected neighbouring colour in a smart way.Although the work was complex and challenging, it showed impressive payload-distortion performance.In comparison, Grover and Mohapatra [32] proposed an edge-based technique of high imperceptibility to be used for colour-image authentication.Starting from the centre pixel in the B channel,the method embedded two secret bits in the smooth pixels and three bits in the sharp pixels using the LSB method.Rashid and Majeed [33] proposed a technique that applied edge detection on the Blue component and used the edge positions as indicators of the existence of data in the Green component.This method used only the edge positions that satisfied a threshold value,which increased the security of the method.

Some of the modern steganographic methods defined a distortion function to minimise the embedding detected alteration [10, 11, 34, 35].For example, Yaofei Wang and his team in [10] discussed image steganography utilising the differences between the colour channels.Interestingly, they observed the G channel which had specifically stronger correlation than others, that is, its resistance to detection was better.Furthermore, the work in [10] innovated non-additive costs for colour image steganography, distributing the embedding capacity between the three channels in a smart way so as to not violate the Complexity Prior rule.Similarly, the payload partition image steganography in [11] relied on amplifying channel modification probabilities to assign embedding capacity to RGB channels.Their clustered strategy made the embedding changes concentrated in textured regions,achieving better resistance to many steganalysis.Some distortion functions were additive in which the costs were summed over to form the function (clarified in [11]) and some were non-additive as in [10] as well as in [34, 35].

The techniques mentioned so far worked in the spatial domain in which the image pixels were manipulated directly to embed the secret content.The techniques that were designated to work in the frequency domain transformed the pixels into the frequency distribution.Then the produced coefficients were utilised for embedding.In the end, the altered coefficients were inversely transformed to form the stego image.Some examples of the transforms used for data hiding are the discrete Fourier transform [21], discrete cosine transform [36] and the discrete wavelet transform[37].These types of techniques are computationally complex and can carry fewer data [16] compared with the spatialdomain techniques.

In this article, we propose two methods that work in the spatial domain and their embedding performance is the best among six LSB-based techniques, with a high visual quality of the produced stego images.The novel contributions of this article are briefed below:

●Splitting the 360 hue values of the HSV colour model into 24 groups of equal size and assigning a specific hue name for each group.The names are derived from the 12 basic hues.Each group is further divided into clusters of two or three members.We make the embedding in the hue plane of a pixel to be by changing the hue value to another value but within the same cluster and group.In this way, we improve the image quality of the embedding in the hue plane.

●Improving the embedding capacity of six existing 1LSBbased methods by proposing two data hiding techniques.

●Improving the average visual quality of three existing methods by proposing the hue-based embedding (HBE)data hiding technique.It uses the hue of only the saturated pixels to embed one or two secret bits.

●Improving the average visual quality of five existing methods and the proposed HBE method by proposing the three-planes embedding (TPE) data hiding technique.It uses one of the three HSV planes for embedding in each pixel.The embedding plane in a pixel is specified depending on the value of theSandVplanes.When the embedding plane isH, two bits at maximum are embedded using the HBE method.Otherwise, one bit is embedded using the simple LSB substitution method.

3|PROPOSED METHODS

This work presents two improvements.The general processes that are involved in the embedding and extraction phases are illustrated in Figure 1.At first, the cover image is converted from the RGB to the HSV model to produce the HSV image.Then,one of the two proposed embedding methods is applied to hide the secret message within the resultant image.The output of this process is the image in the HSV space that encloses the sensitive data.This image is then converted back to the RGB model in order to form the final stego image.For data extraction,the stego image is converted to HSV and then the corresponding extraction technique is applied to the image.

In Section 3.1, we discuss the first proposed embedding method followed by discussing the corresponding extraction method in Section 3.2.The second proposed embedding technique is explained in Section 3.3 and the recovery process is described in Section 3.4.

3.1|Data embedding using HBE met hod

In this section, we discuss the embedding phase of our first proposed technique, that is, the HBE method.It uses theHplane of the HSV colour space as the main component for hiding.The first step of this method is the conversion of the image from the RGB model to the HSV model by normalising theR,GandBcomponents to be in the range[0,1]instead of[0, 255].The next step is the calculation of theH,SandVcomponents with the help of the equations provided in [38].Then, the value ofHis transformed from the range [0, 1] to the range [0,360]by multiplying it by 360 and rounded to the nearest integer value.In this method,we hide one or two secret bits in the hue of the pixels that have saturation value not equal to 0%.On the other hand,there is no embedding in the other pixels whenSequals to 0%.

This technique depends on categorising the hues of the HSV colour space based on the 12 basic hues.For simplicity,we give names for the tertiary hues as followed:Red-Yellow is Orange, Yellow-Green is Chartreuse green, Green-Cyan is Spring green, Cyan-Blue is Azure,Blue-Magenta is Violet and Magenta-Red is Rose.We further divide the hues into 24 groups and each group has a range of 15°.The names of the groups are taken from the basic 12 hues and the hues between each of them.These groups are represented as pies of hues in Figure 2.The green degrees marked in the figure represent the exact positions of the 12 basic hues.The following are a detailed view of the ranges and names used for the groups:

We further divide each group into clusters that have three members as follows:(h1,h2,h3),(h4,h5,h6),(h7,h8,h9),(h10,h11,h12)and(h13,h14,h15).The Red group is a special case because it is not a continuous group as it is separated at 0°(360°).Therefore, its clusters may have three or two members as follows:(353°,354°,355°),(356°,357°),(358°,359°),(0°,1°,2°),(3°,4°,5°),(6°,7°).

After obtaining the HSV image, the embedding process starts by scanning the image from left to right and top to bottom to embed the bits sequentially.For each pixel,we check if the value ofSis greater than zero.If so,we embed data in the roundedHof this pixel.The embedding is done by first determining the group and the exact cluster within the group that this hue belongs to.Depending on the number of members in the cluster and the value of one secret bit,the number of bitsnthat can be embedded in the pixel and the new hues valueHstegare determined.

If the cluster has only two members,we embed one bit,son=1.In this case,theHstegwill be the first hue in the cluster if the bit is 0 while theHstegwill be the second hue in the cluster if the bit is 1.If the cluster is of three, we check the value of one secret bit;if it is 0,n=1 and theHstegwill be the first hue in the cluster.If it is 1,n= 2 and theHstegis determined as follows:if the next secret bit is 0,Hstegwill be the second hue in the cluster;if the next bit is 1,theHstegwill be the third hue in the cluster.

It is worth to mention that the 360° belongs to the Red cluster (358°, 359°), but the cluster is still treated as a twomember cluster because 360° is the same as 0°.If we treat the cluster as a three-member cluster, there will be incorrect recovery of the secret bits in the data extraction phase.The main goals of the clusters used are to increase the embedding space while keeping the embedding value within the group and to reduce the difference between the old and the new values of the pixels hue to two at maximum.

The final steps in the embedding phase are the normalisation of theHto be back in the range [0, 1], by dividing it by 360, and then the conversion of the image from HSV to RGB with the help of the equations provided in [38], to be sent to the receiver.Note that the RGB image is in the range[0, 1].

A practical example of the embedding in the proposed HBE technique is represented in Figure 3.Using a cover image of size 2 × 2, the process is started by converting the cover image to the HSV colour space and then scanning the pixels inthe following sequence: A, B, C and D.Assuming that the secret bit stream is (011,010), the embedding procedure is as follows:

F I G U R E 1 The general framework of the proposed scheme.HSV, Hue-Saturation-Value; RGB, Red-Green-Blue

F I G U R E 2 Geometric representation of the hue groups used in our hue-based embedding method

For each pixel,we check its suitability for HBE data hiding by ensuring that its saturation value is not 0.Starting from pixel A,its hue is normalised to be in the range[0,360]and rounded to an integer.Then, we define its group asRed-Orangebecause theHfalls in the range (8°-22°).The exact cluster that it belongs to is (14°, 15°, 16°), which has three members;so we will check the value of one secret bit if it is 0 or 1.Because the bit is 0,we will embed one bit in the pixel,n=1,and there is no need to check the next secret bit.Additionally,the stego value ofHwill be the first hue in the cluster,Hsteg= 14.For pixel B, itsHbelongs to the groupRoseand cluster(323°,324°,325°).It is a three-member cluster,and so one secret bit is checked and its value is 1.Thus, another bit will be checked, which means thatn= 2.The next bit is 1;therefore, theHstegwill be the third hue in the cluster, 325.Pixel C has a rounded hue of 360 and so it follows theRedgroup and the two-member cluster(358°,359°).In this type of cluster, we check only one secret bit and here it is 0; so theHstegis the first hue in the cluster.Following the same procedure,the hue of pixelDbelongs to theRose-Redgroup and the three-member cluster(347°,348°,349°).One bit from the secret is 1,and so we will take another bit which is 0.Thus,the new hue value is the second hue in the cluster,Hsteg= 348.

Next, all the hues are normalised back to the [0, 1] range and combined with the originalSandVplanes to reshape the HSV image that contains the hidden data.Finally, the reconversion from HSV to RGB is applied to produce the stego image, which is in the range [0, 1].

3.2|Data extraction using the HBE method

On the receiver side,the secret message can be extracted from the stego image by applying the extraction procedure of the proposed HBE technique.The process is started by converting the image from the RGB space to the HSV space.Then,theHplane is normalised to be in the range[0,360]and rounded to an integer.The image is scanned sequentially to extract the bits from the pixels that have saturation value greater than zero.The following is the details of the extraction process:

For each pixel,we determine the group and the cluster that its hue belongs to.If the cluster is of two members, there is only one hidden bit in the pixel and it is determined by the value of theHstegas follows:If theHstegis the first hue in the cluster, the bit is 0; otherwise, the bit is 1.If the cluster contains three members, three cases are considered as follows: if theHstegis the first hue in the cluster, there is only one bit hidden and it is 0; otherwise, there are two hidden bits in the pixel.These two bits are (10) if theHstegis the second hue in the cluster and (11) if theHstegis the third hue in the cluster.Finally,all the secret bits are concatenated together to form the entire secret stream.

F I G U R E 3 Example of embedding data into a 2×2 image using the HBE method.(a)Cover image in[0,255]and[0,1]ranges;(b)Hue-Saturation-Value(HSV) image; (c) Embedding procedure; (d) HSV image with embedded data; (e) Red-Green-Blue (RGB) stego image

Using the embedding example in Figure 3, we can extract the secret data by applying the above procedure.At first, the stego image is transformed to the HSV colour model and the output is the HSV image that contains the secret bits.

The normalisedHvalues of all the four pixels are checked for data extraction because all of them are saturated.The cluster of pixel A is(14°,15°,16°)and theHstegis the first hue in the cluster; so the secret bit is 0.Pixel B belongs to the (323°, 324°, 325°) cluster and itsHstegis the third pixel in the cluster,so two secret bits are extracted which are(11).The third pixel follows the(358°,359°)cluster and the stego hue is the first hue in the cluster; thus the secret bit is 0.The cluster of pixel D is (347°, 348°, 349°) and theHstegis equal to the second hue in the cluster; so the two secret bits are (10).Finally, all the bits are concatenated as (011, 010) which is the full secret message.

3.3|Data embedding using the TPE method

This section explains the hiding process of our second proposed technique that is called the three-plane embedding method.TPE uses the three planes of the HSV colour model for embedding.First,the cover image is converted to the HSV space using the method in [38].Then, theHplane is normalised to the range[0,360]and theSandVcomponents are normalised to the range [0, 255].In TPE, all of the pixels are involved in the hiding process as follows:

For each pixel, we check whether it is unsaturated, that is,S= 0 or not.If so, one bit is embedded in theVplane using the simple LSB substitution method.If not, we check the values of theSandVplanes.If the embedding condition([S≤51]or[V≤51])is satisfied,the hiding takes place in theHplane using the HBE method;otherwise,theSplane is used for hiding one secret bit using the LSB method.

In other words,theVcomponent is utilised for embedding in the grey pixels and theHcomponent is utilised in the pixels that are either maximum 20% saturated or maximum 20%illuminated;otherwise theScomponent is utilised in the pixels that have both saturation and value above 20%.Note that 20%is equal to 51 in the range [0, 255].

Finally, the three planes are normalised back to the range[0, 1] and the image is retransformed to the RGB space using the conversion method in [38].A numerical example of the TPE embedding process is given in Figure 4 and it is explained as follows:

Using a 2 × 2 cover image, it is converted to the HSV space and then the pixels are scanned from A to D to embed the bit stream (10,010).Starting from pixel A, theSplane is equal to zero which means it is an unsaturated pixel.So, the embedding will take place in theVplane on replacing the LSB of the normalisedVby one secret bit.The other three pixels are saturated pixels; so the embedding condition is checked to decide whether the embedding plane isHorS.Pixel B does not satisfy the condition because itsSandVare both above 20%;so theSplane will be the place for embedding one secret bit by the LSB substitution.Pixel C has a saturation of less than 20%and pixel D has a value of less than 20%;so both of themfulfil the condition and the embedding will be in theHplane.For pixel C, it belongs to the (236°, 237°, 238°) cluster of theBluegroup and its one secret bit is 0; so theHstegis the first hue in the cluster.Pixel D belongs to the (254°, 255°, 256°)cluster of theBlue-Violetgroup and its one secret bit is 1; so another bit will be taken, which is 0.Thus, theHstegis the second hue in the cluster.

F I G U R E 4 Example of embedding data into a 2 × 2 image using the three-planes embedding method.(a) Cover image in [0, 255] and [0, 1] ranges;(b) Hue-Saturation-Value (HSV) image; (c) Embedding procedure; (d) HSV image with embedded data; (e) Red-Green-Blue (RGB) stego image.LSB, least significant bit

Next,all the planes are normalised back to the range[0,1]and the combination of them forms the HSV image that holds the secret.Lastly,the image is converted back to the RGB model in the range[0,1]and this stego image is sent to the receiver.

3.4|Data extraction using the TPE method

For extracting the secret data from the stego image, the data extraction process of the proposed TPE method is performed as explained in this section.First, the image is transformed to the HSV colour model.Then, the hue plane is normalised to the range[0,360]and both the saturation and the value planes are normalised to the range[0,255].The subsequent steps are described as follows:

For each pixel, we firstly check its saturation value.If itsSis zero,we extract one secret bit from the LSB of theVplane.If not,we check whether itsSandVare both above 20%or 51 in the range[0,255].If so,one secret bit is extracted from the LSB of theSplane; otherwise, one or two secret bits are extracted from theHplane using the extraction procedure of the HBE method,see Section 3.2.After scanning all the pixels in the image,the secret message is the concatenation of all the extracted bits.

We give a practical example of the TPE data extraction process by extracting the secret bits from the stego image in Figure 4.The image is first converted to the HSV space,followed by normalising the three planes to the abovementioned ranges.From pixel A to D, we notice that only the first pixel is unsaturated; so we extract the LSB of theVplane of pixel A as a secret bit.Pixel B is saturated and illuminated at values above 20%; so the LSB of theSplane is a secret bit.Pixel C is saturated at a value of less than 20%and the last pixel is illuminated at a value of less than 20%;therefore we extract secret bits from their hue planes.Since the cluster that the pixel C belongs to is(236°,237°,238°)and theHstegis the first hue in the cluster, one secret bit is 0.Pixel D belongs to the (254°, 255°, 256°) cluster that has three members and theHstegis the second hue in the cluster;so we extract two secret bits which are (10).Finally, all the bits are grouped to form the secret data.

4|COMPARISONS AND ANALYSIS

In this section, we analyse the performance of the two proposed data hiding methods with respect to some of the existing state-of-the-art techniques that are different from reversible data hiding based on image interpolation [7].The description of the platform and assessment metrics used is given in Section 4.1, followed by a discussion of the experimental results of the two techniques in Section 4.2.

4.1|Experimental study

We used the MATLAB R2018a software running on 2.9 GHz Intel Core i7 CPU and 8 GB RAM as the platform for performing the experiments.We implemented the two proposed techniques as well as the following six existing methods:Karim et al.[12],simple LSB substitution in theSplane of the HSV model (LSB[S]) and simple LSB substitution in theVplane (LSB[V]), Muhammad et al.[18], HSV-MLSB [15] and Alwan et al.[20].For the HSV-MLSB method [15], we chose the block size to be 2 × 2 as it provided the maximum embedding capacity for the method.The techniques were applied on 25 colour images of size 512 × 512, which were downloaded from the CVG-UGR image database [39] as shown in Figure 5.Additionally, the secret stream used was pseudo-random bits.

For evaluating the visual quality of a colour stego imageSwith respect to the corresponding original cover imageC, we used the PSNR,in dB,as a metric.It requires the value of the mean square error (MSE) to be calculated independently for the three channels of the RGB model.The equations of the PSNR and the MSE are given in Equations (1) and (2),respectively,where the two images are of sizeM×Nand theC(i,j)andS(i,j)are the values of the pixels at rowiand columnjin the two images.A high PSNR value of a stego image indicates that it is of high security quality.

F I G U R E 5 The 25 test images

The second performance metric used in the experiments is the embedding capacity in bits.It measures the maximum amount of the secret payload that the image can carry by means of a hiding technique.As it increased,the number of the embeddable bits increased.

T A B L E 1 Performance evaluation of the proposed HBE and TPE methods in three colour spaces over 25 test images.The highest value for each metric is shown in boldface

T A B L E 2 Comparison of PSNR values and embedding capacity values of the eight methods.The highest value for each metric for each image is shown in boldface

TA B L E 2 (Continued)

4.2|Analysing the data hiding results

In this section,we examine the outcomes of the two proposed techniques and the six methods, which were involved in the experiments, in terms of the visual quality and the embedding capacity.

First, we embedded the secret message into all the test images using our proposed HBE and TPE methods in three hue-based colour spaces: HSV, HSI and HSL.Using the TPE method, theVplane in HSV was considered as theIandLplanes in the other two spaces.According to Table 1,the HSV model achieved the highest average capacity in the HBE method, while it scored the highest average PSNR in the TPE method.On the contrary, the HSI model reached the utmost quality in HBE,while it attained the maximum capacity in TPE.HSL was approximately in the middle in all cases.

F I G U R E 6 Comparison of embedding capacity values of the eight methods.HBE, hue-based embedding; HSV, Hue-Saturation-Value; LSB,least significant bit; TPE, three-planes embedding

The reason the HSI model provided the highest PSNR in the HBE method is that it obtained the lowest payload in the method and there is usually an inverse relationship between the amount of the payload and the visual quality.Likewise,the HSV model provided the highest PSNR in the TPE method because it attained the lowest embedding capacity in the method.

On comparing the two methods in all the spaces,the HSV model achieved the best average capacity and PSNR.This is one of the reasons that we chose it as the colour model of our proposed methods.

The second experiment was the implementation of all the eight competed techniques.The performance results are given in Table 2.From the table, it can be observed that our HBE could embed at least 265,723 bits and maximum 393,064 bits,while TPE could hide at least 271,769 bits reaching at most 364,249.It is obvious that both of our methods achieved the best embedding capacity among all the other methods in all the images.The reason is that all the other techniques are 1LSBbased; so they embed maximum one bit into a pixel, whereas our methods might embed one or two bits into a pixel.In most of the images, our HBE method was better than our TPE method in terms of the embedding capacity.But the latter was better than the former in terms of the visual quality of the images.Figure 6 illustrates the embedding capacity values of all of the eight techniques.

By looking at our HBE method,it can been observed that it attained PSNR values ranging from 46.50 to 60.60 dB,which are considered high values of the image quality.Compared with the existing methods,the average security quality of HBE is better than LSB(V) and the methods proposed by Muhammad et al.[18]and Alwan et al.[20].In Figure 7,we provide a diagrammatic representation of the visual quality of the eight methods.

F I G U R E 7 Comparison of peak signal to noise ratio values of the eight methods.HSV, Hue-Saturation-Value; LSB, least significant bit

F I G U R E 8 Comparison of peak signal to noise ratio (PSNR) values of the eight methods for varying embedding size in test images (a) Airplane,(b) Baboon, (c) House, (d) Average of 25 images.HSV, Hue-Saturation-Value; LSB, least significant bit; TPE, three-planes embedding

Our TPE method achieved PSNR values of minimum 55.09 dB and maximum 61.76 dB; so the visual quality ofthe images is very high.Additionally, the average quality of the method was the best among the five existing techniques by Karim et al.[12], LSB(V), Muhammad et al.[18],HSV-MLSB [15] (with block size = 2 × 2) and Alwan et al.[20].

On the other hand, the average PSNR of the LSB(S)method was higher than our TPE method but by less than 1 dB, and ours was better than the former in nine images including four standard images: airplane, baboon, house and sailboat.The average PSNR of the LSB(S)method was higher than the two approaches proposed for most of the images because it embedded less payload and the maximum difference between the value of a pixel before and after the embedding was 1, while in our methods the difference could reach 2,which might reduce the quality.

The high visual quality of the LSB(S)method and the high payload of our HBE method made us compromise both in our TPE method by using a percentage of 20%to be the threshold of embedding in either theHorSplanes.Increasing this threshold will increase the embedding capacity but reduce the visual quality and vice versa.

The PSNR results of the techniques used by varying the size of the embedded bits are shown in Figure 8.The payload sizes tested were chosen by taking into consideration that the HSV-MLSB [15] method in our experiments had a maximum capacity of 131,072 bits.Therefore, the selected sizes did not exceed this capacity.As we can see in the figure,our proposed TPE method scored the highest average PSNR among all the methods in embedding 60, 90 and 120 kilo bits of data.The proposed TPE method provided a smaller average PSNR than the LSB(S) approach when the embedding size was 30 Kb because an outlier PSNR value of 89.16 dB appeared when embedding this payload in the ‘Blue-eye’ image using the LSB(S)method.This outlier led to increasing the methods average quality more than ours.

5|CONCLUSION

In this article, we have proposed two enhanced data hiding techniques that use the HSV colour model to improve the embedding and security performance.We used the HSV space because it is more suitable for our methods than the HSI and HSL models, as verified in the experiments.Both of the techniques proposed outperformed the embedding capability of the methods in [12, 15, 18, 20] as well as the LSB(S) and LSB(V) methods with high image quality.These existing competing methods are either in RGB, HSI, HSV or YCbCr colour spaces.In our HBE method, we utilised the hue plane for embedding one or two bits in all the saturated pixels; so the hiding capacity of the method could reach 393 Kb and the security quality could reach 60 dB.Our TPE method was a combination of the HBE, LSB(S) and LSB(V)techniques in which we applied LSB(V) on the unsaturated pixels, LSB(S) on the pixels that are of both high saturation and high brightness and HBE on the rest of the pixels.This combination made the TPE method have a visual quality of at least 55 dB in all the test images with a payload of at least 271 Kb.The experiments have proven that on average, our HBE method could embed more bits than our TPE method and its average PSNR is higher than LSB(V) and the methods in [18, 20].Additionally, our TPE technique achieved the best average visual quality compared with HBE, LSB(V) and the methods in [12, 15, 18, 20].

In the future,we plan to further increase the visual quality of the TPE technique by replacing the simple LSB substitution method in the saturation and value planes with more improved methods.

ACKNOWLEDGMENTS

Thanks to Umm Al-Qura University (UQU) for supporting this work.There is no funding source.

CONFLICT OF INTEREST

The authors declare that they have no conflict of interest.

ORCID

Adnan Gutubhttps://orcid.org/0000-0003-0923-202X