Skip to main content
Log in

Dual-image based high image quality reversible hiding scheme with multiple folding zones

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A dual-image technique is often used in reversible data hiding. In this technique, secret information is concealed within a host image to generate two stego-images. In 2015, Lu et al. proposed a center-folding strategy to enhance the performance of the reversible hiding scheme. In their scheme, the value range of the secret data is divided into two zones. The medium value is subtracted from each value of the value range to generate the folded value. The folded value is smaller than that of the original value such that the image quality of the stego-image can be increased. However, there is still room for improvement.

This study proposes a novel method to further narrow down the folded value. The proposed scheme divides the value range into several zones instead of only two zones. Furthermore, the scheme re-encodes the secret information according to the number of zones and the maximum distortion between the stego-pixel and the host pixel. The re-encoded value is then separated into two parts and embedded in an image. Through this process, image quality can be significantly improved.

The proposed scheme uses different zone sizes and the maximum distortion to control the hiding rate and image quality. The hiding rates of the proposed scheme with a zone size set at 12 and maximum distortion of each pixel set at 5 is 1.75 bit per pixel (bpp), and the image quality is 43.22 dB, which is higher than that of Lu et al.’s scheme, Lee et al.’s scheme, Chang’s scheme and Wang’s scheme. Using a similar hiding rate, the image quality of the proposed scheme has a higher embedding performance than that of the schemes of Xue et al., Arham et al., and Zhang et al.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31

Similar content being viewed by others

References

  1. Alaseri K, Gutub A (2018) Merging secret sharing within Arabic text steganography for practical retrieval. J Comput Sci Eng 4(9):1–17

    Google Scholar 

  2. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  3. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Article  Google Scholar 

  4. Arham A, Nugroho HA, Adji TB (2017) Multiple layer data hiding scheme based on difference expansion of quad. Signal Process 137:52–62

    Article  Google Scholar 

  5. Atawneh S, Almomani A, Bazar HA, Sumari P, Gupta BB (2017) Secure and imperceptible digital image Steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

    Article  Google Scholar 

  6. Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two Steganographic images. Proceedings of IEEE Region Tenth International Conference (TENCON): 1–4

  7. Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using Sudoku. Proceedings of 2008 3rd international conference on innovative computing information and control, China

  8. Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering: 145–152

  9. Chang CC, Liu YJ, Nguyen TS (2014) A novel turtle Shell based scheme for data hiding. Proceedings of Intelligent Information Hiding and Multimedia Signal Processing Conference IIH-MSP, Japan

  10. Chen TS, Shiu CW (2008) A minimal Euclidean distance searching technique for Sudoku steganography. Proc Int Symp Inform Sci Eng 1:515–518

    Google Scholar 

  11. Debasis G, Biswapati J, Kumar MS (2016) Dual image based reversible data hiding scheme using three pixel value difference expansion. Inform Syst Design Intell Applic 434:403–412

    Google Scholar 

  12. El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083

    Article  Google Scholar 

  13. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D research - springer

  14. Gutub A, Aljuaid N (2018) Multi-bits Stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering 1(2)

  15. Gutub A, Alsaidi A, Al-lehaibi K, Alzahrani H (2018) Compression multi-level crypto Stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math (JCSCM) 8(3):33–42

    Google Scholar 

  16. Jafar IF, Darabkh KA, Al-Zubi RT, Saifan RR (2016) An efficient reversible data hiding algorithm using two steganographic images. Signal Process 128:98–109

    Article  Google Scholar 

  17. Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual Stegano images using orientation combinations. Telecommun Syst 52(4):2237–2247

    Article  Google Scholar 

  18. Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual Steganographic images. Proceedings of the Third International Conference on Ubiquitous Information Management and Communication: 228–237

  19. Li JZ, Yu CY, Gupta BB, Ren XC (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561

    Article  Google Scholar 

  20. Lu TC, Wu JH, Huang CC (2015) Dual-image based reversible data hiding method using center folding strategy. Signal Process 115:195–213

    Article  Google Scholar 

  21. Ni ZC, Shi YQ, Ansari N, Su W (2003) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362

    Google Scholar 

  22. Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two Steganographic images. Multimed Tools Appl 74:5861–5872

    Article  Google Scholar 

  23. Schaefer G, Stich M (2004) UCID - an uncompressed colour image database. Storage Retriev Methods Applic Multimed 5037:472–480

    Google Scholar 

  24. Tain J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  25. Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143

    Article  Google Scholar 

  26. Wang J, Ni J, Zhang X, Shi YQ (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybernet 47(2):315–326

    Google Scholar 

  27. Wang F, Guo YT, Yin ZX, Zhou X, Zhao QL (2018) Data hiding method based on reference matrix. Proc Comput Sci 131:800–809

    Article  Google Scholar 

  28. Xue B, Li X, Wang J, Guo Z (2017) Improved reversible data hiding based on two-dimensional difference-histogram modification. Multimed Tools Appl 76(11):13473–13491

    Article  Google Scholar 

  29. Yao H, Qin C, Tang ZJ, Tian Y (2017) Improved dual-image reversible data hiding method using the selection strategy of Shiftable pixels’ coordinates with minimum distortion. Signal Process 135:26–35

    Article  Google Scholar 

  30. Wang WQ, Ye JY, Wang TQ, Wang WF (2018) A high capacity reversible data hiding scheme based on right-left shift. Signal Process 150:102–115

    Article  Google Scholar 

  31. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322–328

    Article  Google Scholar 

  32. Zheng QM, Wang XM, Khan MK, Zhang WF, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access

  33. Zou L, Sun J, Gao M, Wan W, Gupta BB (2018) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia Tools and Application: 1–16

Download references

Acknowledgements

The authors gratefully acknowledge the financial support of this study from the National Science Council (NSC), Taiwan, Republic of China, under the Grant NSC107-2637-E-324 -004. This research is partially sponsored by Chaoyang University of technology (CYUT) and Higher Education Sprout Project, Ministry of Education, Taiwan, under the project: The R&D and the cultivation of talent for Health-promotion products. The authors also want to thank Prof. Goutam Chakraborty who give us a great help and served as scientific advisors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzu-Chuen Lu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lu, TC., Lu, YC. & Vo, T.N. Dual-image based high image quality reversible hiding scheme with multiple folding zones. Multimed Tools Appl 78, 34397–34435 (2019). https://doi.org/10.1007/s11042-019-07904-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07904-7

Keywords

Navigation