Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, reversible data hiding has become one of the most commonly used techniques. In this paper, a novel dual image reversible data hiding (RDH) technique based on a quinary secret square is proposed. In this technique, the imperceptibility and data hiding capacity are improved while maintaining good image quality in a lossless manner. The information overhead sent to the receiver for extraction and recovery is also reduced. A secret square is used during the embedding and extraction processes. In addition, the use of 5-ary numbers rather than binary numbers is proposed to ensure that all secret messages are embedded from the symbols. This technique uses two pixels as a block (2 × 2) and a maximum of 25 symbols to embed the secret message. In the experiments, 25 symbols and 16 symbols were used to embed a 512 × 512 image. Two hiding capacities were achieved by using two different numbers of symbols, as previously mentioned. Using 16 symbols, the technique achieved good average PSNR values for both PSNR1 and PSNR2 with an average PSNR of 51.60 dB for the same data hiding capacity of 524,288 bits. With 25 symbols and the exact same technique, the embedding capacity was increased to 608,174 bits, which is greater than the hiding capacity of other existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Converting from one number format to another., Available: https://searchsecurity.techtarget.com/definition/steganography, Accessed: 30 September 2021

  2. Cryptography Definition, Available: https://www.kaspersky.com/resource-center/definitions/what-is-cryptography, Accessed:2 August 2021

  3. Hu Y, Lee H, Chen K, Li J (2008) ‘Difference expansion based reversible data hiding using two embedding directions.’ IEEE Trans Multimedia 10:1500–1512

    Article  Google Scholar 

  4. Kamstra HJ, Heijmans AM (2005) ‘Reversible data embedding into images using wavelet techniques and sorting.’ IEEE Trans Image Process 14:2082–2090

    Article  MathSciNet  Google Scholar 

  5. Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H (2008) ‘A novel difference expansion transform for reversible data embedding.’ IEEE Trans Inf Forensics Secur 3(3):456–465

    Article  Google Scholar 

  6. Kim S, Qu X, Sachnev V, Kim HJ (2019) ‘Skewed histogram shifting for reversible data hiding using a pair of extreme predictions.’ IEEE Trans Circuits Syst Video Technol 29:3236–3246

    Article  Google Scholar 

  7. Kim P-H, Ryu K-W, Jung K-H (2020) Reversible data hiding scheme based on pixel-value differencing in dual images. Int J Distrib Sens Netw 16(7). https://doi.org/10.1177/1550147720911006

  8. Lee C-F, Shen J-J, Agrawal S, Wang Y-X, Lee Y-H (2020) Data hiding method based on 3d Magic cube. IEEE Accesss 8:39445–39453

    Article  Google Scholar 

  9. Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89

    Article  Google Scholar 

  10. Malik A, Wang HX, Chen Y, Khan AN (2020) ‘A reversible data hiding in encrypted image based on prediction-error estimation and location map.’ Multimed Tools Appl 79:11591–11614

    Article  Google Scholar 

  11. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  12. Nadipally M (2019) Optimization of methods for image-texture segmentation using ant colony optimization. Intell Data Anal Biomed Appl 2:21–47

    Google Scholar 

  13. Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) ‘Pairwise prediction-error expansion for efficient reversible data hiding.’ IEEE Trans Image Process 22:5010–5021

    Article  MathSciNet  MATH  Google Scholar 

  14. Peak Signal-to-Noise Ratio as an Image Quality Metric, Available: https://www.ni.com/zh-tw/innovations/white-papers/11/peak-signal-to-noise-ratio-as-an-image-quality-metric.html, Accessed: 5 August 2021

  15. Puteaux P, Puech W (2018) ‘An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images.’ IEEE Trans Inf Forensics Secur 13:1670–1681

    Article  Google Scholar 

  16. Qu X, Kim H (2015) ‘Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding.’ Signal Process 111:249–260

    Article  Google Scholar 

  17. Sahu AK, Swain G (2019) Dual stego-imaging based reversible data hiding using improved LSB matching. Int J Intell Eng Syst 12(5):63–74

    Google Scholar 

  18. Sahu K, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D Research 10(2). https://doi.org/10.1007/s13319-018-0211-x

  19. USC-SIPI Image Database. [Online]. Available: https://sipi.usc.edu/database/. Accessed 3 August, 2021

  20. Wang Z (2004) Image quality assessment: from error visibility to structural similarity. Trans Image Process 13(4):600–612

    Article  Google Scholar 

  21. Wang Z, Bovik AC (2009) Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures. IEEE Signal Process Mag 26(1):98–117

    Article  Google Scholar 

  22. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  23. What is Steganography, Available: https://searchsecurity.techtarget.com/definition/steganography, Accessed:2 August 2021

Download references

Acknowledgements

This work was partially supported by the National Science and Technology Council of the Republic of China under the Grant No. 110-2221-E-153-002-MY2, 110-2218-E-218-001 and 111-2221-E-115-038.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Yao Weng.

Ethics declarations

Competing interest

As authors of this paper, we declare that we have no financial interest in our paper, and no external authorities or relationships have influenced the work reported in the paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, CT., Shongwe, N.S., Weng, HY. et al. Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images. Multimed Tools Appl 82, 42699–42716 (2023). https://doi.org/10.1007/s11042-023-15255-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15255-7

Keywords