Skip to main content
Log in

Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel dual-image-based reversible data hiding scheme using exploiting modification direction (EMD) is proposed. This scheme embeds two 5-base secret digits into each pixel pair of the cover image simultaneously according to the EMD matrix to generate two stego-pixel pairs. By shifting these stego-pixel pairs to the appropriate locations in some cases, two meaningful shadows are produced. The secret data can be extracted accurately, and the cover image can be reconstructed completely in the data extraction and the image reconstruction procedure, respectively. Experimental results show that our scheme outperforms the comparative methods in terms of image quality and embedding ratio. Pixel-value differencing (PVD) histogram analysis reveals that our scheme achieves a higher security. Moreover, a tampered shadow can effectively be detected through the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci 3(4):118–124

    Google Scholar 

  2. Bai J, Chang CC, Nguyen TS, Zhu C, Liu YJ (2017) A high payload steganographic algorithm based on edge detection. Displays. 46:42–51

    Article  Google Scholar 

  3. Chang CC, Yu YH, Hu YC (2005) Hiding secret data in images via predictive coding. Pattern Recogn 38(5):691–705

    Article  Google Scholar 

  4. Chang CC, Wu WC, Hu YC (2007) Lossless recovery of a VQ index table with embedded secret data. J Vis Commun Image Represent 18(3):207–216

    Article  Google Scholar 

  5. Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In: Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, pp 1–4

  6. C.C. Chang, T.C. Lu, G. Horng, Y.H. Huang, Y.M. Hsu (2013) A high payload data embedding scheme using dual stego-images with reversibility. In: Proceedings of the Third International Conference on. Information, Communications and Signal Processing, Tainan, Taiwan, pp 1–5

  7. Chang IC, Hu YC, Chen WL, Lo CC (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376–388

    Article  Google Scholar 

  8. Chuan Q, Hu YC (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55

    Article  Google Scholar 

  9. Gutub A, Aljuaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng 1(2):1–9

    Google Scholar 

  10. Hu YC (2006) High capacity image hiding scheme based on vector quantization. Pattern Recogn 39(3):1715–1724

    Article  MATH  MathSciNet  Google Scholar 

  11. Huynh NT, Bharanitharan K, Chang CC (2015) Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105–112

    Article  Google Scholar 

  12. Jung KH (2018) A survey of interpolation-based reversible data hiding methods. Multimed Tools Appl 77(7):7795–7810

    Article  Google Scholar 

  13. Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction schemes. Comput Math Appl 60(2):319–325

    Article  MathSciNet  MATH  Google Scholar 

  14. Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52:2237–2247

    Article  Google Scholar 

  15. Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, pp 228–237

  16. Li F, Mao Q, Chang CC (2018) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77(5):5149–5168

    Article  Google Scholar 

  17. Liu YJ, Chang CC (2018) Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients. Displays. 51:51–56

    Article  Google Scholar 

  18. Liu YJ, Chang CC (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310

    Article  Google Scholar 

  19. Liu YJ, Chang CC, Nguyen TS (2016) High capacity turtle shell-based data hiding. IET Image Process 10(2):130–137

    Article  Google Scholar 

  20. Liu L, Chang CC, Wang A (2016) Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimed Tools Appl 75(18):11311–11326

    Article  Google Scholar 

  21. Liu L, Chang CC, Wang A (2017) Data hiding based on extended turtle shell matrix construction method. Multimed Tools Appl 75(18):11311–11326

    Article  Google Scholar 

  22. Nguyen TS, Chang CC (2015) A reversible data hiding scheme based on the Sudoku technique. Displays. 39:109–116

    Article  Google Scholar 

  23. Nguyen TS, Chang CC, Hsueh HS (2016) High capacity data hiding for binary image based on block classification. Multimed Tools Appl 75(14):8513–8526

    Article  Google Scholar 

  24. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE T Circ Syst Vid 16(3):354–362

    Article  Google Scholar 

  25. Tian J (2003) Reversible data embedding using a difference expansion. IEEE T Circ Syst Vid 13(8):890–896

    Article  Google Scholar 

  26. Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143

    Article  MATH  Google Scholar 

  27. Wu NI, Hwang MS (2017) Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images. Displays. 49:116–123

    Article  Google Scholar 

  28. Yu CM, Wu KC, Wang CM (2011) A distortion-free data hiding scheme for high dynamic range images. Displays. 32:225–236

    Article  Google Scholar 

  29. Zhang XP, Wang SZ (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1–3

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Chen Hu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, JY., Chen, Y., Chang, CC. et al. Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction. Multimed Tools Appl 78, 25855–25872 (2019). https://doi.org/10.1007/s11042-019-07783-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07783-y

Keywords

Navigation