||Reversible Data Hiding Scheme Using Turbo Code
||Vidya Sawant;Archana Bhise
||Modified matrix embedding; Reversible data hiding; Secret key interleaver; Syndrome embedding; turbo code
||A reversible data hiding scheme provides security for a secret message by embedding it in a cover image. After extracting the secret message at the receiver, the scheme restores the original message and the cover image without any distortion. However, data transmitted by the reversible data hiding scheme is vulnerable to the noise existing on the communications channel. A reversible data hiding scheme using turbo code is proposed in this paper to address that problem.
The proposed reversible data hiding integrates modified matrix embedding, turbo code, and syndrome embedding to provide improved embedding capacity, security, and error correction.
Modified matrix embedding hides the secret message in the cover image. The resulting stego-image is then encrypted and encoded by the turbo code. Turbo code deploys a secret key interleaver that shuffles the incoming bits using elliptic curve arithmetic and a secret key. The exact recovery of the cover image and the secret message by the receiver depends on the user-specific secret key.
Modified matrix embedding hides a large number of secret message bits, which distorts the stegoimage.
However, encrypting the stego-image with the secret key interleaver makes the embedding invisible. The proposed syndrome embedding transmits the locations of the modified bits in the cover image, and enables the receiver to reverse the effects of embedding. Simulation results with the proposed scheme demonstrate a high embedding capacity and improved error correction performance of 10-4 for an additive white Gaussian noise (AWGN) channel at an SNR of 2dB. It also successfully recovers the exact cover image and the secret message, compared to existing schemes such as matrix embedding and reversible data hiding in the encrypted domain. Moreover, the results depict high resistance to brute force attacks, statistical attacks, noise attacks, and cropping attacks.