Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 7, pp 8785–8803 | Cite as

Reversible data hiding in dual Stegano-image using an improved center folding strategy

  • Li-Pin Chi
  • Chang-Han Wu
  • Hsung-Pin Chang
Article

Abstract

In recent years, the dual stego-image reversible data embedding methods have been developed rapidly, e.g., exploiting modification direction, magic matrix, least significant bit matching, and center folding strategy. The kind of method can effectively embed secret data into two stego-images and maintain excellent image quality and enhance the security. In 2015, Lu et al. proposed a center folding strategy that can effectively encode messages as the smaller digits. The encoding procedure reduces the modification level of pixels, thereby maintaining good image quality. However, their strategy does not use the relationship between the adjacent digits to reduce the number of the largest digits. Inspired by joint neighboring coding, we proposed a dynamic encoding strategy to improve the center folding strategy. The encoding strategy can reduce the secret digits and decrease the occurrence frequency of the maximum digits, thereby substantially reducing the modification level of pixels. The advantage makes that the proposed method can achieve a higher PSNR value than previous methods under the same embedding rate.

Keywords

Dual stego-image reversible data embedding Center folding strategy Joint neighboring coding Dynamic encoding 

References

  1. 1.
    Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In Proceedings of IEEE Region 10 International Conference (TENCON), pp. 1–4Google Scholar
  2. 2.
    Chang CC, Lu TC, Chang YF, Lee RCT (2007) Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium. International Journal of Innovative Computing, Information and Control 3(5):1145–1160Google Scholar
  3. 3.
    Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145–152Google Scholar
  4. 4.
    Chang CC, Lu TC, Horng G, Huang YH, Hsu YM (2013) A high payload data embedding scheme using dual stego-images with reversibility. In Proceedings of Third International Conference on Information, Communications and Signal Processing, pp. 1–5Google Scholar
  5. 5.
    Chung KL, Huang YH, Chang PC, Mark Liao HY (2010) Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. IEEE Trans Circuits Syst Video Technol 20(11):1643–1647CrossRefGoogle Scholar
  6. 6.
    Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electronics Express 5(20):870–876CrossRefGoogle Scholar
  7. 7.
    Horng G, Huang YH, Chang CC, Liu Y (2014) (k, n)-image reversible data hiding. Journal of Information Hiding and Multimedia Signal Processing 5(2):152–164Google Scholar
  8. 8.
    Huang YH, Chang CC, Wu CY (2014) A DNA-based data hiding technique with low modification rates. Multimedia Tools and Applications 70(3):1439–1451CrossRefGoogle Scholar
  9. 9.
    Jana B, Giri D, Mondal SK (2016) Dual-image based reversible data hiding scheme using pixel value difference expansion. International Journal of Network Security 18(4):633–642Google Scholar
  10. 10.
    Lee CF, Chen HL (2012) Adjustable prediction-based reversible data hiding. Digital Signal Process 22(6):941–953MathSciNetCrossRefGoogle Scholar
  11. 11.
    Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247CrossRefGoogle Scholar
  12. 12.
    Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228–237, 2009Google Scholar
  13. 13.
    Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83(10):1864–1872CrossRefGoogle Scholar
  14. 14.
    Lu TC, Lu CM, Chang CC (2007) Multimedia security techniques, Taiwan: CHWAGoogle Scholar
  15. 15.
    Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89CrossRefGoogle Scholar
  16. 16.
    Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 15:195–213CrossRefGoogle Scholar
  17. 17.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  18. 18.
    Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687–2695CrossRefGoogle Scholar
  19. 19.
    Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Qin C, Chang CC, Horng G, Huang YH, Chen YC (2015) Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Security and Communication Networks 8(6):899–906CrossRefGoogle Scholar
  21. 21.
    Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. In Proceedings of International Conference on Image Processing 3, 1549–1552Google Scholar
  22. 22.
    Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730MathSciNetCrossRefGoogle Scholar
  23. 23.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  24. 24.
    Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626CrossRefzbMATHGoogle Scholar
  25. 25.
    Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Aeronautical Research LaboratoryNational Chung-Shan Institute of Science and TechnologyTaichungTaiwan
  2. 2.Department of Computer Science and EngineeringNational Chung Hsing UniversityTaichungRepublic of China

Personalised recommendations