Dual-image based high image quality reversible hiding scheme with multiple folding zones
- 41 Downloads
A dual-image technique is often used in reversible data hiding. In this technique, secret information is concealed within a host image to generate two stego-images. In 2015, Lu et al. proposed a center-folding strategy to enhance the performance of the reversible hiding scheme. In their scheme, the value range of the secret data is divided into two zones. The medium value is subtracted from each value of the value range to generate the folded value. The folded value is smaller than that of the original value such that the image quality of the stego-image can be increased. However, there is still room for improvement.
This study proposes a novel method to further narrow down the folded value. The proposed scheme divides the value range into several zones instead of only two zones. Furthermore, the scheme re-encodes the secret information according to the number of zones and the maximum distortion between the stego-pixel and the host pixel. The re-encoded value is then separated into two parts and embedded in an image. Through this process, image quality can be significantly improved.
The proposed scheme uses different zone sizes and the maximum distortion to control the hiding rate and image quality. The hiding rates of the proposed scheme with a zone size set at 12 and maximum distortion of each pixel set at 5 is 1.75 bit per pixel (bpp), and the image quality is 43.22 dB, which is higher than that of Lu et al.’s scheme, Lee et al.’s scheme, Chang’s scheme and Wang’s scheme. Using a similar hiding rate, the image quality of the proposed scheme has a higher embedding performance than that of the schemes of Xue et al., Arham et al., and Zhang et al.
KeywordsDual-based reversible hiding scheme Center-folding strategy Steganalysis Re-encoding Multiple zones StegExpose
The authors gratefully acknowledge the financial support of this study from the National Science Council (NSC), Taiwan, Republic of China, under the Grant NSC107-2637-E-324 -004. This research is partially sponsored by Chaoyang University of technology (CYUT) and Higher Education Sprout Project, Ministry of Education, Taiwan, under the project: The R&D and the cultivation of talent for Health-promotion products. The authors also want to thank Prof. Goutam Chakraborty who give us a great help and served as scientific advisors.
- 1.Alaseri K, Gutub A (2018) Merging secret sharing within Arabic text steganography for practical retrieval. J Comput Sci Eng 4(9):1–17Google Scholar
- 6.Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two Steganographic images. Proceedings of IEEE Region Tenth International Conference (TENCON): 1–4Google Scholar
- 7.Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using Sudoku. Proceedings of 2008 3rd international conference on innovative computing information and control, ChinaGoogle Scholar
- 8.Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering: 145–152Google Scholar
- 9.Chang CC, Liu YJ, Nguyen TS (2014) A novel turtle Shell based scheme for data hiding. Proceedings of Intelligent Information Hiding and Multimedia Signal Processing Conference IIH-MSP, JapanGoogle Scholar
- 10.Chen TS, Shiu CW (2008) A minimal Euclidean distance searching technique for Sudoku steganography. Proc Int Symp Inform Sci Eng 1:515–518Google Scholar
- 11.Debasis G, Biswapati J, Kumar MS (2016) Dual image based reversible data hiding scheme using three pixel value difference expansion. Inform Syst Design Intell Applic 434:403–412Google Scholar
- 13.Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D research - springerGoogle Scholar
- 14.Gutub A, Aljuaid N (2018) Multi-bits Stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering 1(2)Google Scholar
- 15.Gutub A, Alsaidi A, Al-lehaibi K, Alzahrani H (2018) Compression multi-level crypto Stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math (JCSCM) 8(3):33–42Google Scholar
- 18.Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual Steganographic images. Proceedings of the Third International Conference on Ubiquitous Information Management and Communication: 228–237Google Scholar
- 21.Ni ZC, Shi YQ, Ansari N, Su W (2003) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362Google Scholar
- 23.Schaefer G, Stich M (2004) UCID - an uncompressed colour image database. Storage Retriev Methods Applic Multimed 5037:472–480Google Scholar
- 26.Wang J, Ni J, Zhang X, Shi YQ (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybernet 47(2):315–326Google Scholar
- 32.Zheng QM, Wang XM, Khan MK, Zhang WF, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE AccessGoogle Scholar
- 33.Zou L, Sun J, Gao M, Wan W, Gupta BB (2018) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia Tools and Application: 1–16Google Scholar