Keywords

1 Introduction

Today, everyone in the world uses the internet and finds it to be quite useful. Digital data protection is both important and difficult. Using steganography and digital watermarking techniques is one way to protect the security of digital data. This is especially important for different types of multimedia data, such text, images, audio files, and video files. Information concealment using established and emerging scientific techniques such as steganography and digital watermark embedding. In order to secure and safeguard digital materials from any illegal access, this is the primary criterion. In order to defend the legitimate rights, it resolves copyright disputes, offers proof to counter illegal copying, and authenticates, ownership identification, detects copy move fraud, uses digital forensics, and detects tampering with multimedia content.

In steganography, extra information that is embedded in a digital cover entity is protected. Steganographic techniques’ primary objective is to hide embedded data from an attacker. Because only the sender and recipient will be aware that the secret information is included inside the transmitted cover object, this assertion allows for the safe transmission of sensitive information over an open communication channel [1].

The digital cover items themselves are protected via digital watermarking techniques. A digital object’s integrity and authenticity are attested to by a digital watermark. Digital watermarks are used to control data integrity and to authenticate the origins of data in order to safeguard the authorship of multimedia files [2].

Secret communication, authentication, copyright protection, ownership identification, copy move forgery, digital forensics, and tamper detection of multimedia documents are just a few of the uses for data hiding. Digital watermarking, cryptography, steganography, data encryption, and other methods fall under the category of data concealing and are used to protect digital media and information. Data concealing is a technique of incorporating information in the form of signal that can withstand noise, such as an audio, video, or image file. The invisibility of embedding is typically the primary need for steganographic methods to be effective. These days, robust embedding algorithms that can find embedded data in a digital item are developed as data hiding algorithms. However, a number of authors are creating algorithms with additional quality markers.

Digital watermarking [4] and steganography [3] are two techniques to achieve this goal. Based on their level of robustness, we can classify digital watermarking techniques into three groups: fragile, semi-fragile, and robust. A minimal alteration to the watermarked signal would cause the detection of the message at the receiver end to fail in a fragile watermarking. This type of watermarking is helpful for integrity proof. Moderate alterations are resistant to semi-fragile watermarking. Therefore, we can use this kind of watermarking to protect against a certain type of attack. When using robust watermarking, the watermark message can withstand numerous attacks. For the protection of copyright, this is helpful.

Spatial and transform domain algorithm are two categories of data concealment or steganography [5]. Regarding hiding ability, visual quality, security, storage space, robustness, and execution time, each of these categories has advantages and disadvantages of their own. The cover image’s pixels immediately encode the secret message in the spatial domain [7], However, in the transform domain [8], the cover media must first undergo a transformation to acquire frequency coefficients and modified coefficients for data embedding, such as discrete fourier transform (DFT) [8], discrete wavelet transform (DWT) [11], or discrete cosine transform (DCT) [10]. The robustness is then achieved by embedding the secret message bits into significant coefficients. Despite the higher computational complexity of transform domain techniques, it is believed that watermarks inserted in transform domains withstand attacks better than those embedded in spatial domains.

A special focus has been placed on designing protocols that take advantage of the features included in the cover image in order to boost resilience.

The following are some important key features of data hiding schemes:

  1. (i)

    Reversibility: One approach to authentication is data concealment. Watermarking, however, has the potential to deteriorate the cover data that was present in the original cover media after embedding. The receiver end makes it challenging to obtain a precise cover medium. However, in recent times, it has become crucial to retrieve original cover media in a variety of human-centric application fields like the military and medicine. Such programs use reversible data hiding as opposed to traditional data concealing.

  2. (ii)

    Security: Security of a method is assessed by how well it defends against potential assaults. The data concealment technique utilised in real applications has been determined to have some security flaws based on the work that has already been done. Regarding unauthorised detection, the stego image should not provide any indications as to the existence of the hidden message.

  3. (iii)

    Payload: Payload is the quantity of information inserted within the cover image. It is a key component of data hiding schemes, therefore it was evident from the literature review that many researchers are attempting to boost embedding capacities while preserving image quality. The payload should be as high as possible while maintaining a discernible level of image quality.

  4. (iv)

    Integrity/Tamper detection: Tampering is the planned alteration of documents so that the consumer would be harmed. Therefore, it is crucial for the authorised user to expose both the secret information and the cover image throughout the extraction process.

  5. (v)

    Imperceptibility/visual quality: Any technique for hiding data must meet the imperceptibility criteria first and foremost. There shouldn’t be any visual deterioration due to the embedding data that is included in the original image. For the hidden message to remain imperceptible and harmful, it must not be seen by humans, cannot be detected by their eyes, and must not cause any visual distortion in the stego image. Therefore, maintaining acceptable visual quality after embedding the hidden data is a crucial quality of any invisible data concealment strategy.

  6. (vi)

    Robustness: A media action, such as filtering, lossy compression, or alteration, is considered robust if the hidden message can still be discovered. There are times when delicate confidential data may be required. Fragile data means that it should not resist manipulation or would only resist to a limited degree. It is a critical prerequisite for data concealing.

2 Literature Survey

Wenyin and Shih [21] demonstrated a semi-fragile watermarking technique utilising Local Binary Pattern (LBP) operators, pixel contrast, and a multilevel picture water-marking system. A straightforward texture descriptor called the LBP operator which was developed by Ojala et al. [22]. With the help of suggested methodology, the author has demonstrated that the watermarking techniques can withstand standard image processing operations including JPEG compression, brightness alteration, contrast modification, and additive noise. The results, however, were not thoroughly compared with any other LBP schemes and were not robust against significant geometrical attacks.

Fan et al. [23] developed a data concealing method that can only conceal four secret data bits within a (3 × 3) block using a weighted matrix for a grayscale image. Tseng et al. [24] suggested an effective binary image data embedding technique that makes use a weighted matrix W with key matrix K. There is only one modular sum of entry-wise multiplication that can be performed using a weighted matrix W and a (3 × 3) pixel block for both of these matrix-based data hiding methods. A significant research question is still how to achieve large capacity with reversibility in watermarking while preserving decent visual quality. Reversible data hiding (RDH) becomes a crucial and difficult issue in hidden data communication for authentication, copy right protection and ownership identification in medical and military applications. Through the use of picture interpretation, Jana et al. [25] created a weighted matrix-based reversible data hiding strategy that can conceal 2.97 bpp. However, Chowdhuri et al. [26] created a weighted matrix-based reversible data concealing method that uses the colour image and provides image authentication and tamper detection. To repeatedly embed the secret data in each block, they divided the original image into (3 × 3) pixel blocks and multiplied the sum of the entries using a modified weighted matrix. Additionally, the proposed data hiding strategy increased visual quality PSNR 50.03 and data embedding capacity up to 8.03 (bpp) (dB). Their technique was successful in detecting and authenticating tampered images, however it may only partially recover the original cover picture from a manipulated stego image. In their innovative method for image watermarking in the spatial domain [27], Kumar and Dutta combine the well-known LSB substation technique with the idea of information theory. The watermark is positioned in the block with the highest entropy after dividing the cover image into a number of blocks. None of geometric attack difficulties were supported by the experimental findings. Cao et al. [28] developed hamming code-based data hiding techniques with high payload and embedding rates as high as 3 (bpp) and PSNR as low as 51(dB). Bai and Chang [29] have created a high payload steganographic technique for compressed images. They have a 2 (bpp) payload, however their PSNR is under 30(dB). Jana et al. [5, 30] recently developed a partial and dual image based reversible data hiding technique using the (7, 4) hamming code, which may improve data concealing capacity, visual quality, and accomplish reversibility. Su and Chen [31] presented an algorithm that combines frequency and spatial domain to protect copyright.

Watermarked images with good visual quality and good resistance to common image processing attacks, this technique ensures an appropriate compromise between the computational complexity and the authentication level of host images. Due to the watermark being embedded in multiple blocks, the technique’s key value is giving the ability to retrieve the watermark either it cropping or rotation attacks. The goal of Hassan and Gutub [34] was to enhance the reversible data concealment strategy with interpolation. The proposed method scales up the original image utilising the existing enhanced neighbour mean interpolation (ENMI) and modified neighbour mean interpolation (MNMI) approaches before inserting the secret data.

Using a dual watermark approach and blind removal, Rangel-Espinoza et al. [39] suggested a removable visible data concealment system. The brightness and texture properties of the watermark and original images are taken into consideration when placing a visible watermark pattern in the DCT domain to create a visible watermarked image. Without other information, such as the original watermark or host image, the watermark could only be removed using the keys of the right user. The experimental findings demonstrate that the suggested system surpasses earlier comparable efforts with the help of blind removal, retention of the quality of the undamaged restored images, and higher visual degradation of the recovered the content of images in the event of an illegal removal attempt. In the value of the interpolation pixel, Jana et al. [40] presented an effective data hiding strategy that takes advantage of the Centre Folding Strategy (CFS) and Fuzzy Logic System (FLS).

3 Proposed Method

This work uses the Fuzzy weight strategy to construct a novel image interpolation scheme. The interpolated pixel values are produced by taking into consideration each pair of pixels in a particular block’s fuzzy weight value. Each input pixel pair’s fuzzy membership values have been taken to represent the range between the block’s minimum and maximum value. The input membership value is fed into the fuzzy output function, which calculates the fuzzy rule’s strength using the Max–Min composite principle. Then, through a defuzzification process, interpolated pixel values are calculated from the fuzzy output function dependent on the fuzzy rule’s strength. In actuality, fuzzy weight based interpolation algorithms create virtual pixels, which are superior to the interpolation techniques now in use.

FWS based interpolated method

To provide fuzzy interpolated pixel values, a fuzzy rule-based controller with four features—fuzzification, fuzzy rule base, fuzzy inference mechanism, and defuzzification—is developed. As Demirci (Demirci, 2006) demonstrated in his study for similarity calculation, the visual evaluation of a fuzzy interpolated pixel value may vary from one skillful person to another skillful person. Because fuzzy interpolated pixel values between the pixels are imprecise, it is advisable to employ fuzzy rule-based logic to handle them. Two variables, pixel Pi and pixel Pj, are taken into consideration as input for fuzzification in order to determine the fuzzy interpolated pixel value between the pixels. Each component is shown with the fuzzy set for the following fuzzy linguistic variables: Very Low (VL), Low (L), Medium (M), High (H), and Extremely High (VH). These language words can be modelled using a variety of membership functions, including trapezoidal, gaussian, triangular, etc. Nonetheless, due to its simplicity and symmetric representation, the selected representation of the provided linguistic words is a triangular fuzzy number (TFN). The range of possible values is 0–255, with 255 being the maximum. Figure 1 depicts the modelling for both of these factors. A fuzzy inference engine is set up after fuzzification and operates in accordance with predefined rules. A degree of association between two pixels is produced by combining the fuzzy inputs created during fuzzification with the rule basis. The degree to which a fuzzy interpolated pixel value exists is measured by this connection. The ith fuzzy rule according to Eq. (18) is thus expressed as: With n inputs such that x1X1, x2X2, …, xnXn and one output y Y Ri: If x1 is 1, x2 is 2, etc., then xn must be n. The set of inputs in the rule base is also referred to as the antecedent, and the output is referred to as the subsequent, if y is B. Table 1 displays the most effective fuzzy rules that were successful for the recommended job. The linguistic words VVL, VL, L, ML, M, MH, H, VH, and VVH define the form in which the consequent is created. To create a fuzzy output set as the finished product, each rule’s actions are superimposed. The fuzzy output is produced by combining the results of the rules that have been shot. Further defuzzification techniques produce a crisp value on the fuzzy output. Two common defuzzification approaches are area and maxima based methods. The centroid approach is a well-liked area-based defuzzification method. The crisp value, as its name suggests, marks the location at which the output membership function divides the region in half.

Fig. 1
An illustration depicts a pixel value scale with different ranges, including minimum V L, medium M, high H, and very high V H values, as well as equations for V L and V H involving calculations with minimum V min and maximum V max pixel values along x and y axis.

Input pixel pair of a block's membership functions

Table 1 Proposed fuzzy rules

The following is a list of the main steps in image interpolation:

Step-1: Imagine a colour cover image that is (M x N) pixels in size, divided into the three basic colours of Red (R), Green (G) and Blue (B), and then divided into (n × n) pixels for each colour block, where n = 3, 5, 7, 9…

Step-2: Choose Vmin = 0 as the block's minimum and maximum pixel values, respectively, and use those values to calculate the fuzzy membership of each pair of pixels using Vmin as the lower value and Vmax as the higher value with the medium value is \(V_{{{\text{mid}}}} = \left\lceil {\frac{{V_{\min } + V_{\max } }}{2}} \right\rceil\). Assume five linguistic inputs, such as VL for very low, low (L), medium (M), high (H) and very high (VL).

Consider of Fig. 1 as being very highly illustrated.

Step 3: The fuzzy output membership function has been developed using a certain range of pixel values and nine linguistic terms, including VVL-very very low, VL-very low, L-low, ML-medium low, M-medium, MH-medium high, H-high, VH-very high, and VVH-very very high. This function is shown in Fig. 2. The VVL will belong to the scale's lower value, Pi, while the VVH will belong to the scale's higher value, Pj.

Fig. 2
An illustration depicts a pixel value scale with different micro-outputs, including minimum V L, medium M, high H, and very high V H values, as well as equations for V L and V H involving calculations with minimum V min and maximum V max pixel values along x and y axis.

Membership functions for block virtual pixel calculation

Step 4: The fuzzy weighted strategy rule has been built using the nine output parameters VVL, VL, L, ML, M, MH, H, and VH displayed in Table 1 of the rule together with the five input parameters VL, L, M, H, and VH.

Step 5: The strength of the rule has been calculated using the Max–Min composite rule and the actual input values of each pair of pixels from the selected specified block.

Step 6: The next step is to select the appropriate membership value from the fuzzy output function based on the rule's strength. The weighted fuzzy function output is then used to construct the interpolated virtual pixel, and in cases where there are several values, the interpolated pixel value of that block for the selected pixel pair will be the average value.

Numerical Example

Think about the image block in Fig. 3b. As seen in Fig. 3c, We reduce the size of the block by removing one row and one column of pixels. Figure 1 shows the anticipated pixel block produced by the Fuzzy Weight Strategy (FWS). Now think about the pixel pair with the values Pi = 70 and Pj = 120 and Vmin = 0 and Vmax = 255. VL = 0, L = 64, M = 128, H = 192, and VH = 255 are the results.

Fig. 3
An illustration presents numerical examples in three tables. Table 2, Table 3, and Table 4, showcasing data values, with original block, reduced block and predicted block.

Numerical example of fuzzy weight strategy

The following formula is used to determine fuzzy membership values:

$$ \begin{aligned} \mu_{{{\text{VL}}}} (x) & = \frac{64 - x}{{64 - 0}} = \frac{64 - x}{{64}},\quad 0 \le x \le 64, \\ \quad \frac{x - 64}{{64 - 0}} = \frac{x - 64}{{64}},\quad 0 \le x \le 64,{ } \\ \end{aligned} $$
$$ \begin{aligned} \mu_{L} (x) & = \frac{128 - x}{{128 - 64}} = \frac{x - 128}{{64}}{ },\quad 64 \le x \le 128 \\ & \frac{x - 64}{{128 - 64}} = \frac{x - 64}{{64}},\quad 64 \le x \le 128 \\ \end{aligned} $$
$$ \begin{aligned} \mu_{M} \left( x \right) & = \frac{192 - x}{{192 - 128}} = \frac{192 - x}{{64}},\quad 128 \le x < 192 \\ & \quad \frac{x - 128}{{192 - 128}} = \frac{x - 128}{{64}},\quad 128 \le x < 192{ } \\ \end{aligned} $$
$$ \mu_{H} \left( x \right) = \frac{255 - x}{{255 - 192}} = \frac{255 - x}{{63}},\quad 192 \le x < 255 $$
$$ \mu_{{{\text{VH}}}} \left( x \right) = \frac{x - 192}{{255 - 192}} = \frac{x - 192}{{63}},\quad 192 \le x < 255, $$

Similar to that, each colour component of a particular block's membership values for the output fuzzy function were defined, taking into account the lower pixel value of 70 and the higher pixel value of 120, as shown below.

$$ \begin{aligned} \mu_{{{\text{VVL}}}} (z) & = \frac{77 - z}{{77 - 70}} = \frac{77 - z}{7},\quad 70 \le z < 77, \\ & \quad \frac{z - 70}{{77 - 70}} = \frac{z - 70}{7},\quad 70 \le x < 77 \\ \end{aligned} $$
$$ \begin{aligned} \mu_{{{\text{VL}}}} \left( z \right) & = \frac{83 - z}{{83 - 77}} = \frac{83 - z}{6},\quad 77 \le z < 83 \\ & \quad \frac{z - 77}{{83 - 77}} = \frac{z - 77}{6},\quad 77 \le z < 83{ } \\ \end{aligned} $$
$$ \begin{aligned} \mu_{L} \left( z \right) & = \frac{89 - z}{{89 - 83}} = \frac{89 - z}{6},\quad 83 \le z < 89 \\ & \quad \frac{z - 77}{{89 - 83}} = \frac{z - 83}{6}{ },\quad 83 \le z < 89 \\ \end{aligned} $$
$$ \begin{aligned} \mu_{{{\text{ML}}}} \left( z \right) & = \frac{95 - z}{{95 - 89}} = \frac{95 - z}{6},\quad 89 \le z < 95 \\ & \quad \frac{z - 89}{{95 - 89}} = \frac{z - 89}{6},\quad 89 \le z < 95 \\ \end{aligned} $$
$$ \begin{aligned} \mu_{M} \left( z \right) & = \frac{102 - z}{{102 - 95}} = \frac{102 - z}{7},\quad 95 \le z < 102 \\ & \quad \frac{z - 95}{{102 - 95}} = \frac{z - 95}{7},\quad 95 \le x < 102 \\ \end{aligned} $$
$$ \begin{aligned} \mu_{{{\text{MH}}}} \left( z \right) & = \frac{108 - z}{{108 - 102}} = \frac{108 - z}{6},\quad 102 \le z < 108 \\ & \quad \frac{z - 102}{{108 - 102}} = \frac{z - 102}{6},\quad 102 \le z < 108 \\ \end{aligned} $$
$$ \begin{aligned} \mu_{H} \left( z \right) & = \frac{114 - z}{{114 - 108}} = \frac{114 - z}{6},\quad 108 \le z < 114 \\ & \quad \frac{z - 108}{{114 - 108}} = \frac{z - 108}{6},\quad 108 \le z < 114 \\ \end{aligned} $$
$$ \mu_{{{\text{VH}}}} \left( z \right) = \frac{120 - z}{{120 - 114}} = \frac{120 - z}{6},\quad 114 \le z < 120 $$
$$ \mu_{{{\text{VVH}}}} (z) = \frac{120 - z}{{120 - 114}} = \frac{120 - z}{6},\quad 114 \le z < 120 $$

Then, assess the input for each pair of pixels you collected from the block's input fuzzy membership value. In this case, Pi = 70, which is between 64 and 128. Thus, it is necessary to calculate,

$$ \mu_{L} \left( x \right) = \frac{128 - x}{{64}} = \frac{128 - 70}{{64}} = \frac{58}{{64}} $$
$$ \mu_{M} \left( x \right) = \frac{x - 128}{{64}} = \frac{70 - 64}{{64}} = \frac{6}{64} $$

In this case, Pj = 120 which is between 64 ≤ x < 128. Thus, it is necessary to calculate,

$$ \mu_{L} \left( x \right) = \frac{128 - x}{{64}} = \frac{128 - 120}{{64}} = \frac{8}{64} $$
$$ \mu_{M} \left( x \right) = \frac{x - 64}{{64}} = \frac{120 - 64}{{64}} = \frac{56}{{64}} $$

The following formula has been used to determine the strength of the fuzzy rule formed by the first four values:

S1: Pi is (VL) Very Low and Pj is (L) Low, So,

$$ S_{1} = \min \left( {\mu_{L} \left( {70} \right),\mu_{M} (120)} \right) = \min \left( { \frac{58 }{{64}}{ },{ }\frac{8 }{{64}}{ }} \right) = \frac{8}{64} $$

S2: Pi is (VL) Very Low and Pj is (M) Medium, So,

$$ S_{1} = \min \left( {\mu_{L} \left( {70} \right),\mu_{M} (120)} \right) = \min \left( { \frac{58 }{{64}} , \frac{56 }{{64}} } \right) = \frac{56}{{64}} $$

S3: Pi is (VL) Very Low and Pj is (M) Medium, So,

$$ S_{1} = \min \left( {\mu_{L} \left( {70} \right),\mu_{M} (120)} \right) = \min \left( { \frac{6 }{{64}} , \frac{8 }{{64}} } \right) = \frac{6}{64} $$

S4: Pi is (VM) Very Medium and Pj is (M) Medium, So,

$$ S_{1} = \min \left( {\mu_{L} \left( {70} \right),\mu_{M} (120)} \right) = \min \left( { \frac{6 }{{64}} , \frac{ 56 }{{64}} } \right) = \frac{6}{64} $$

The first four numbers together create a fuzzy rule and the following formula has been used to determine the strength of this rule:

MAX {S1, S2, S3, S4}, that is

$$ {\text{MAX}}\left( {\frac{8 }{{64}},\frac{ 56 }{{64}},\frac{ 6 }{{64}},\frac{6 }{{64}}} \right) = \frac{56}{{64}}\quad {\text{i}}.{\text{e}}\;S_{2} $$

As a result, S2, which correlates to Pi being low and Pj being medium, is the rule with the highest strength out of the four. Now, using the defuzzification technique and analyze the fuzzy function that results to determine the virtual pixel:

$$ \frac{z - 83}{6} = \frac{56}{{64}}\quad {\text{i}}.{\text{e}}\;z_{1} = 88.25 $$
$$ \frac{95 - z}{6} = \frac{56}{{64}}\quad {\text{i}}.{\text{e}}\;z_{2} = 89.75 $$

Therefore \(z = \left\lceil {\frac{{z_{1} + z_{2} }}{2}} \right\rceil = \left\lceil {\frac{88.25 + 89.75}{2}} \right\rceil = 89\).

We have determined the projected values 158 and 144 for the diagonal input sets 120,180 and 70,200 respectively, for the central value 151 of the Fig. 1c.

  • if ( interpol > origin )

  •     m =interpol – origin

  •     s = ceil(m/2)

  •     new_interpol =interpol –s

  • else

  •     m = origin – interpol

  •     s = ceil(m/2)

  •   new-interpol = interpol + s.

Lastly, the average between 158 and 144, or \(\left\lceil {\frac{158 + 144}{2}} \right\rceil\) = 151, is used to get the centre predicted value. In Fig. 3c displays the final, identical-sized predicted pixel block that was produced using FWS.

4 Experimental Results with Comparative Analysis

We conducted the following investigation [41] using the six common benchmark photos from the tests: (a) aeroplane, (b) sailboat, (c) Lena, (d) baboon, (e) peppers, and (f) Tiffany in Fig. 4. These 512 × 512-pixel images are fed into the suggested system to evaluate the effectiveness of the suggested research. Several comparisons are used in this part to demonstrate the viability of the created strategy. Secondly, five previously developed strategies are compared to the suggested interpolation technique.

Fig. 4
6 photographs in dark and lighter shade labeled a to f.

Experimental images: a Lena, b Airplane, c Tiffany, d, Lake, e Baboon, f Peppers

To evaluate the advantages and disadvantages of the suggested innovative interpolation method, NMI, INP, ENMI, CRS, and MNMI were used. The suggested embedding strategy is then evaluated using the outcomes of the experiments, and various comparisons are used to investigate the scheme.

The PSNR is computed as follows:

$$ {\text{MSE}} = \frac{1 }{{h \times w}}\mathop \sum \limits_{i = 1}^{h} \mathop \sum \limits_{j = 1}^{w} C\left( {i,j} \right) - S\left( {i,j} \right)^{2} $$
$$ {\text{PSNR}} = 10\log_{10} \left( {{255}^{{2}} /{\text{MSE}}} \right)\left( {{\text{dB}}} \right) $$

Where C(i, j) is the cover image's pixel value, S(i, j) is the stego image's pixel value at position, and MSE is the mean square error. To assess the effectiveness of the interpolation approaches, the PSNR is calculated. The NMI, INP, ENMI, CRS, and MNMI interpolation techniques are compared to the FWS methodology. Table 5 displays the outcomes. The NMI, INP, ENMI, CRS, and MNMI recommended interpolation approaches are all inferior than the FWS based image interpolation scheme. The suggested method showed that, in nearly all of the tested input images, the FWS methodology achieved the greatest PSNR, according to the results reported in Table 5. The PSNR average is roughly estimated to be 33 dB. As a result, the FWS was employed in the suggested technique to produce the enhanced cover image.

Table 5 Six picture interpolation methods have been compared in terms of the visual attributes assessed by PSNR (dB)

5 Conclusion

In this study, after performing picture interpolation with fuzzy weight, an innovative, efficient, and reversible data hiding strategy was created using the centre folding approach. The fuzzy weight of each pair of pixels in a particular image block is taken into account to produce the interpolated pixel values. Subsequently, data hiding operations were carried out in each interpolated pixel by centre folding and comparison with the signal of the secret data. The suggested technique reverses the folded value to match the secret data if the signal differs from that of the interpolated pixel in order to lessen the difference in image distortion between the interpolated picture and the stego-image. You can figure out the hidden data using the discrepancy between the outputs of these interpolated values and the receiver's centre folding scheme. Experimental results and their analysis from many angles show that the suggested method is superior than state-of-the-art approaches. Additionally, security research of RS assaults reveals that the stego image has less noise, which makes it difficult to use it to detect the existence of secret information. The proposed technique may be utilised for authentication or secret data exchange in military, medical, and academic institutions. This method can be applied in the future for image authentication, copyright protection, and ownership identification using cellular automata, local binary patterns, and other methods.