Abstract
In recent years, reversible data hiding has become one of the most commonly used techniques. In this paper, a novel dual image reversible data hiding (RDH) technique based on a quinary secret square is proposed. In this technique, the imperceptibility and data hiding capacity are improved while maintaining good image quality in a lossless manner. The information overhead sent to the receiver for extraction and recovery is also reduced. A secret square is used during the embedding and extraction processes. In addition, the use of 5-ary numbers rather than binary numbers is proposed to ensure that all secret messages are embedded from the symbols. This technique uses two pixels as a block (2 × 2) and a maximum of 25 symbols to embed the secret message. In the experiments, 25 symbols and 16 symbols were used to embed a 512 × 512 image. Two hiding capacities were achieved by using two different numbers of symbols, as previously mentioned. Using 16 symbols, the technique achieved good average PSNR values for both PSNR1 and PSNR2 with an average PSNR of 51.60 dB for the same data hiding capacity of 524,288 bits. With 25 symbols and the exact same technique, the embedding capacity was increased to 608,174 bits, which is greater than the hiding capacity of other existing techniques.
Similar content being viewed by others
References
Converting from one number format to another., Available: https://searchsecurity.techtarget.com/definition/steganography, Accessed: 30 September 2021
Cryptography Definition, Available: https://www.kaspersky.com/resource-center/definitions/what-is-cryptography, Accessed:2 August 2021
Hu Y, Lee H, Chen K, Li J (2008) ‘Difference expansion based reversible data hiding using two embedding directions.’ IEEE Trans Multimedia 10:1500–1512
Kamstra HJ, Heijmans AM (2005) ‘Reversible data embedding into images using wavelet techniques and sorting.’ IEEE Trans Image Process 14:2082–2090
Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H (2008) ‘A novel difference expansion transform for reversible data embedding.’ IEEE Trans Inf Forensics Secur 3(3):456–465
Kim S, Qu X, Sachnev V, Kim HJ (2019) ‘Skewed histogram shifting for reversible data hiding using a pair of extreme predictions.’ IEEE Trans Circuits Syst Video Technol 29:3236–3246
Kim P-H, Ryu K-W, Jung K-H (2020) Reversible data hiding scheme based on pixel-value differencing in dual images. Int J Distrib Sens Netw 16(7). https://doi.org/10.1177/1550147720911006
Lee C-F, Shen J-J, Agrawal S, Wang Y-X, Lee Y-H (2020) Data hiding method based on 3d Magic cube. IEEE Accesss 8:39445–39453
Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89
Malik A, Wang HX, Chen Y, Khan AN (2020) ‘A reversible data hiding in encrypted image based on prediction-error estimation and location map.’ Multimed Tools Appl 79:11591–11614
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Nadipally M (2019) Optimization of methods for image-texture segmentation using ant colony optimization. Intell Data Anal Biomed Appl 2:21–47
Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) ‘Pairwise prediction-error expansion for efficient reversible data hiding.’ IEEE Trans Image Process 22:5010–5021
Peak Signal-to-Noise Ratio as an Image Quality Metric, Available: https://www.ni.com/zh-tw/innovations/white-papers/11/peak-signal-to-noise-ratio-as-an-image-quality-metric.html, Accessed: 5 August 2021
Puteaux P, Puech W (2018) ‘An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images.’ IEEE Trans Inf Forensics Secur 13:1670–1681
Qu X, Kim H (2015) ‘Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding.’ Signal Process 111:249–260
Sahu AK, Swain G (2019) Dual stego-imaging based reversible data hiding using improved LSB matching. Int J Intell Eng Syst 12(5):63–74
Sahu K, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D Research 10(2). https://doi.org/10.1007/s13319-018-0211-x
USC-SIPI Image Database. [Online]. Available: https://sipi.usc.edu/database/. Accessed 3 August, 2021
Wang Z (2004) Image quality assessment: from error visibility to structural similarity. Trans Image Process 13(4):600–612
Wang Z, Bovik AC (2009) Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures. IEEE Signal Process Mag 26(1):98–117
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
What is Steganography, Available: https://searchsecurity.techtarget.com/definition/steganography, Accessed:2 August 2021
Acknowledgements
This work was partially supported by the National Science and Technology Council of the Republic of China under the Grant No. 110-2221-E-153-002-MY2, 110-2218-E-218-001 and 111-2221-E-115-038.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interest
As authors of this paper, we declare that we have no financial interest in our paper, and no external authorities or relationships have influenced the work reported in the paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Huang, CT., Shongwe, N.S., Weng, HY. et al. Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images. Multimed Tools Appl 82, 42699–42716 (2023). https://doi.org/10.1007/s11042-023-15255-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15255-7