An efficient reversible data hiding algorithm using two steganographic images
Introduction
The value of data and the advancement in technology has raised the awareness toward increasing the security of data storage and communication. Encryption, which is basically the transformation of data into a form that is not understood by unintended parties is one of the popular techniques for data protection [1], [2]. However, this transformation of data may make it more tempting for attackers to decrypt and reveal the data. Another approach that can be used is steganography or data hiding [3]. In this approach, digital data is embedded or hidden into another media, such digital audio, image or video in a way that is hard for attackers to identify the presence of hidden data.
In the digital imaging domain, several algorithms data hiding have been proposed. Most of these algorithms are capable of hiding the data bits in the pixels values [4], [5], [6], [7], [8] or in some transformed representation of the image [9], [10]. However, these algorithms are not capable of restoring the original image (the cover image) that was used for data embedding after extraction the data. This is a serious problem when it comes to hiding data in medical images, military maps and artworks where minimal changes in the restored cover images after extraction of the embedded data are not tolerable. Accordingly, a great interest has evolved recently in the development of reversible data hiding (RDH) algorithms which are capable of preserving the cover image once the embedded data is extracted. However, the reversibility feature of these algorithms affected the embedding capacity as well as the quality of the image (the stego image) after the data is hidden when compared to non-RDH algorithms. Thus, most of the conducted research in RDH algorithms focuses on improving these two features while guaranteeing reversibility.
Generally, RDH algorithms in the spatial domain can be classified into two groups; difference expansion and histogram-based algorithms. In difference expansion algorithms, the difference between the pixel value and its prediction is expanded and the data bits are embedded in the difference value. Tian [11] proposed the first difference expansion algorithm in which he conducted a two-fold expansion to embed the data. Tian's work was the basis for other algorithms in this category. For example, Alattar extended the basic algorithm to use the difference of four pixels and embedded 3 bits in a 2-fold difference value [12].
Considering the histogram-based algorithms, they are based on analyzing the histogram of the pixels or the prediction error values and then embed the message bits into the most frequent value(s). Ni et al. proposed the first histogram shifting algorithm [13]. The algorithm computes the histogram of the pixels values and then searches for the most occurring (the peak bin) and the least occurring value (zero or minimum) bin. Afterward, the histogram bins between the peak and zero bins are shifted toward the zero bin in order to empty the bin next to the peak bin. Data bits are embedded by either keeping the pixels that correspond to the peak unchanged when the bit to embed is 0 or adjusting them to take the value that corresponds to the neighboring bin when the bit is 1. This algorithm showed impressive results in terms of the quality of the stego image as it guaranteed a lower bound on the peak signal-to-noise ratio (PSNR) of 48.1 dB. However, the embedding capacity in Ni's algorithm is dependent on the count of the pixels in the peak bin, which is relatively low in natural images. Nonetheless, the simplicity and the efficiency of the Ni's algorithm triggered the development of several algorithms that are based on the idea of histogram shifting [14], [15]. These extensions on the histogram shifting technique showed significant improvement in terms of embedding capacity. Hong et al. [16] extended the basic histogram shifting algorithm by considering the histogram of prediction errors instead of the intensity histogram. The algorithm relied on the fact that prediction errors are sharply centered near the origin, thus higher embedding capacity is expected. Actually, Hong's algorithm showed impressive increase in the embedding capacity when compared to [13] and at the same time it achieved the same lower bound on the image quality since pixels are altered by 1 in the worst case. The idea on using prediction errors was later adopted in many algorithms where the primary difference was in using different or multiple predictors in order to improve the prediction accuracy which is directly proportional to the embedding capacity [17], [18], [19], [20], [21].
Although these RDH algorithms were capable of increasing the embedding capacity to rates that may exceed 1 bit per pixel (bpp), this was at the expense of lowering the PSNR value of the stego images significantly. For example, the average maximum embedding capacity for the algorithm proposed in [22] was around 1.58 bpp; however, the average PSNR value was around 32 dB. This might be considered a critical issue for the imperceptibility requirement in data hiding. Accordingly, a new trend in the development of RDH algorithms which considers the use of two or dual images for data hiding has evolved to address this issue. Basically, these algorithms duplicate the cover image and embed the data by manipulating the pixels in the two image copies simultaneously in a way that exploits the similarity between the two image copies in order to increase the embedding capacity while maintaining reasonable high PSNR values for the stego images. As a matter of fact this cannot be achieved in single-image RDH algorithms when they are applied to two copies of the cover image since these algorithms will not take advantage of the similarity between the two covers. Additionally, dual-image RDH algorithms can be claimed to increase the protection of the embedded data [23] since distributing the embedded data across the two images makes it harder for attackers to extract and/or recover the image in case they have one of the stego images.
Chang et al. [23] proposed a dual-image RDH algorithm that uses the exploiting modification direction (EMD) and the modulo function to build a modulo matrix with values in the range 0–255. The data bits are first converted to quinary data and every two pixels in the two images formed a set for embedding. The right and left diagonals of the modulo matrix are then used to create camouflage pixel values. The algorithm achieved an embedding capacity of 1 bpp with PSNR value around 45 dB. The algorithm was further extended in [24] to improve the quality of the two stego images to about 48.1 dB. In [25] a dual-image RDH algorithm was proposed in which one pixel is only modified by ±1 at most which resulted in improving to the quality to 52 dB but at the expense of reducing the capacity to 0.75 bpp. The quinary representation of data bits was replaced in [26] with a decimal representation. This increased the embedding capacity to about 1.55 bpp; however, the image quality to decreased to around 39 dB.
In [27], Qin et al. performed embedding in the first copy of the cover image based on the EMD concept and modified the second image copy using a set of three rules that are determined adaptively based on the embedding result of the first copy. The algorithm achieved an embedding capacity that slightly above 1 bpp. However, the quality of the two stego images was asymmetric. Lu et al. [28] explored modifying the embedding rules of the least significant bit matching method for reversible data embedding in dual images. Their algorithm was capable of achieving a maximum embedding capacity around 1 bpp with relatively acceptable symmetric image quality around 49 dB. Lee et al. proposed a reversible data hiding scheme based on combinations of pixel orientations in the two steganographic images to enhance embedding capacity and preserve good visual quality [29]. An average embedding capacity of 1.07 bpp was achieved with stego image quality around 49.6 dB. The varying performance of these different algorithms in terms of the embedding capacity, complexity and the quality of the two stego images still has room for further improvement.
In this paper, we propose a novel and simple RDH algorithm that is based on using dual images. Unlike similar dual image RDH algorithms, the proposed algorithm, is not based on the modulo matrix and uses simple embedding rules in order to improve the embedding capacity and reduce complexity. Effectively, the algorithm consists of three embedding phases. The first phase considers modifying the two image copies simultaneously to embed one bit in each pixel in the two images. Afterwards, each of the two subsequent phases considers embedding data in one of the images based on prediction. However, no complex predictors are used in these phases. Alternatively, in each of these two phases, one image is used as the prediction of the other image. The experimental results proved the ability of the proposed algorithm in achieving embedding capacity around 1.23 bpp with image quality above 48 dB for both stego images. On top of this, the processing time requirements of the proposed algorithm are significantly lower than other dual-image RDH algorithms.
The rest of this paper is organized as follows. Section 2 discusses the proposed algorithm. Section 3 presents the experimental evaluation of the proposed algorithm and compares its performance with the state-of-the-art algorithms. Finally, Section 4 concludes the paper.
Section snippets
The proposed algorithm
Fig. 1 shows the general framework for the proposed algorithm which consists of three phases. The embedding in the first phase relies on using four simple rules to embed secret bits in the two images simultaneously to produce two temporary stego images. The other two phases rely on the concept of prediction, but without using complex predictors. Specifically, each of these two phases uses one of the temporary stego images that are produced by the first phase as the prediction for the other one.
Performance evaluation
In order to assess the performance of the proposed algorithm, a large set of images were used. A subset of eight 512×512 images that were obtained from [32] is presented here for illustration purposes. These images are shown in Fig. 6. The evaluation considered comparing the performance of the proposed algorithm with Chang's et al., Qin et al. and Lu et al. algorithms [26], [27], [28]. In all experiments, a random secret message is generated and embedded in the test images using the four
Conclusion
A reversible data hiding algorithm that is based on the concept of dual images is proposed in this paper. The algorithm consists of three consecutive phases, where the first phase embeds one bit in each pixel in the two images approximately by modifying pixels values in the two images via a set of four simple rules. On the other hand, the other two phases employ the concept of prediction for embedding secret data bits. Unlike prediction-based reversible data hiding algorithms, the proposed
References (34)
Data encryption: a non-mathematical approach
Comput. Secur.
(1997)- et al.
Hiding secret data in images via predictive coding
Pattern Recognit.
(2005) - et al.
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism
J. Vis. Commun. Image Represent.
(2011) - et al.
Dual imaging-based reversible data hiding technique using LSB matching
Signal Process.
(2015) - et al.
A method for obtaining digital signatures and public-key cryptosystem
ACM Commun,
(1978) - et al.
Digital watermarking: algorithms and applications
IEEE Signal Process. Mag.
(2001) - S.-H. Liu,, T.-H. Chen,, H.-X. Yao, W. Gao, A variable depth LSB data hiding technique in images, in: Proceedings of...
- H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, Image steganographic scheme based on pixel-value differencing and LSB...
- K. Darabkh, I. Jafar, R. Al-Zubi, M. Hawa, An improved image least significant bit replacement method, in: Proceedings...
- et al.
A New image steganographic approach for secure communication based on LSB replacement method
Inf. Technol. Control
(2015)
Asymptotically optimal detection for additive watermarking in the DCT and DWT domains
IEEE Trans. Image Process.
Reversible data embedding using a difference expansion
IEEE Trans. Circuits Syst. Video Technol.
Reversible data hiding
IEEE Trans. Circuits Syst. Video Technol.
“Reversible data hiding scheme based on maximum histogram gap of image Blocks,”
KSII Trans. Int. Inf. Syst.
High capacity lossless data hiding based on histogram modification
IEICE Electron. Express
Cited by (47)
Reversible data hiding based on three shadow images using rhombus magic matrix
2021, Journal of Visual Communication and Image RepresentationCitation Excerpt :It also uses the secret sharing concept to improve the security of data transmissions, in which only the receiver who obtains the both stego-images can extract the secret data. Thus, dual-image-based data hiding has attracted increasing attention from researchers [18–29]. In 2009 and 2013, Chang et al. [18,19] improved the embedding capacity of [17] by enlarging the size of the sub-matrix.
Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare
2020, Computer CommunicationsA survey on secure communication techniques for 5G wireless heterogeneous networks
2020, Information FusionHigh-fidelity dual-image reversible data hiding via prediction-error shift
2020, Signal ProcessingCitation Excerpt :This is because the overflow risk pixels in [37] are first modified to the security interval before embedding; thus, this modification may cause visible distortions in the images that contain a large number of easily overexposed areas, such as the sky. In general, the average PSNRs of [29,37,37], and our method are 57.52 dB, 58.04 dB, 63.98 dB, and 65.28 dB, respectively. Thus, our method still presents the highest PSNR value.
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images
2019, Journal of Visual Communication and Image RepresentationDual image reversible data hiding using trinary assignment and centre folding strategy with low distortion
2019, Journal of Visual Communication and Image RepresentationCitation Excerpt :This is because the pure embedding capacity of the proposed algorithm is about 45.8% higher than that of [26]. The best effective embedding capacity is shown by [28] which is more than that of the proposed algorithm by about 11.8%. It should be noted that for the proposed algorithm, the length of the passwords is the same as the number of cover pixels being used for hiding the secret data.