Abstract
The paper proposes an iterative approach based reversible data hiding with weight update used for dual stego images. Proposed method initially estimates the error between the adjacent pixels from which the embedding strength \(\propto \) is estimated. Proposed method then estimates a weight using the error and the data to be hidden. This weight is updated iteratively by using the subsequent data. Further, to improve the security, the random binary sequence is mixed with the weight. To acquire the two stego images, the weight is entrenched on the original image pixels. In the extraction phase, the data is extracted in a reverse order of embedding, where the inverse weight updation is performed, from which the data is extracted. By averaging the two stego images, the original image can be restored. According to the results of the experimental study, the proposed scheme for embedding data on dual stego images outperforms recent data hiding algorithms in terms of embedding rate and visual efficiency.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
Image [1] data hiding is the technique of preserving the confidential or secret content inside a cover image. Data hiding [2] has recently become common in the fields of medicine, military, and copyright protection. In particular, in the field of medicine. [3] patient records such as medical history can be reversibly obscured in scan images. This allows the practitioner to quickly view the medical records without having to re-study them. In military applications [4], the confidential data can be shared between the soldiers of a country by hiding it in a cover image. Data hiding is also essential for maintaining the image content’s [5] ownership. The two broad area of data hiding are steganography and cryptography [6, 7]. The steganography algorithm [8] aims to recover the hidden data completely when the stego image is not subject to attacks. When the stego image is attacked, these algorithms typically fail to recover the data. The [7,8,9] embedding capacity is highly limited, if the steganography algorithm produces a single stego image. As a result, dual stegano image-based algorithms are implemented, which can carry a large number of data without losing the stego image’s visual quality. Stego photos are secret data contained in the original cover image.
Histogram shifting [10], difference expansion [11], LSB substitution [12], and prediction error expansion [13] are some of the most basic data hiding algorithms. The aim of the histogram shifting algorithm is to estimate the cover image’s histogram of pixel values; the data is then embedded by creating a vacancy bin. The visual quality of these algorithms is excellent, but the embedding rate is extremely poor. By changing the LSB bit of the cover image pixels, the LSB substitution [12] algorithm hides the details. This scheme has a low degree of distortion, but it is insecure. By shuffling the LSB bit, an unauthorised user can easily extract the secret data. The prediction error expansion [13] and difference expansion scheme provides a very high embedding rate, but it creates a high distortion, since the prediction error or difference value is high near the edges [22].
Several dual data hiding techniques are derived from the prediction error expansion and difference expansion. The algorithm includes exploiting modification direction (EMD) [14], encoding based schemes [15] and location based scheme [16]. The EMD scheme [15] uses a modulus function to embed the data. The centre folding strategy folds the decimal data and then embeds it on the cover image. The modified centre folding strategy [17] uses an encoding scheme to encode the decimal data and then embedded the encoded indices in the cover image. The location based technique uses a pair of pixels \({X}_{i,j}\) and \({X}_{i,j+1}\) to embed the data. The cover pixels \({X}_{i,j}\) and \({X}_{i,j+1}\) is modified as \({X}_{i,j}^{^{\prime}}\) and \({X}_{i,j+1}^{^{\prime}}\) after embedding a 2-bit message.
The shiftable position [18] scheme is proposed where it uses an optimal parameter to estimate the code length. Y.L Wang et al. [19] used last 3 bits to embed the data which is derived from the LSB substitution method. The method K.H Jung et al. [20] used modulus function in vertical and horizontal direction instead of estimating in diagonal direction. The binary data is converted to base 5 values for embedding. Chang et al. [14, 21] extended the EMD scheme using a \(3\times 3\) and \(5\times 5\) modulus function.
2 The Proposed Algorithm
The data embedding scheme and data extraction scheme are the two phases of the proposed process, as shown in the following section.
2.1 Proposed Embedding Scheme
The block diagram of proposed embedding scheme is depicted in Fig. 1.
Let \({X}_{1}\), \({X}_{2}\)………\({X}_{K}\) be the \(K\) number of pixels where the data is to be embedded. By calculating the error between adjacent pixels, the data is embedded. Enable eqn to be used to estimate the error between adjacent pixels
The proposed method estimate an adaptive weight using the error \({e}_{i}\). The adaptive weight is estimated using the relation,
e where \(d\) is the data to be embedded. The problem with Eq. (2) is, if the error \({e}_{i}\) is 0, then the weight becomes \({w}_{i}={w}_{i-1}\). If the data \(d\) is either 0 or 1 (in case of binary), the Eq. (2) loss the property of reversibility. To solve this issue, the Eq. (2) can be modified as,
where \(\alpha \) is the factor that decides the embedding strength. Lower the value of \(\alpha \) creates less distortion. The value of \(\alpha \) is selected such that using Eq. (5)
Improve the security, the Eq. (4) is modified as Eq. (6)
where \({k}_{i}\) is the \(K\) binary random sequence generated using key ‘U’. The Eq. (4) can be modified in two cases based on the value of \(\alpha \),
In this paper, we use the weight update Eq. (7) as \(w_{i} = w_{i - 1} + d \times \left[ {e_{i} + \alpha } \right] - k_{i}\) and \(\alpha = \left| {\min \left( {e_{i} } \right) - 1} \right|\). If the data is binary \(d \in \left[ {0,1} \right]\), the weight update Eq. (8) is expressed as,
Instead of using the binary data 0 or 1, the \(K\) number of binary data can be grouped together and converted to decimal to form a decimal data \(D\). Therefore the weight update equation can be expressed as using Eq. (9)
The weight updation in a two dimensional image is expressed as,
\(i = 1,2 \ldots \ldots \ldots ..M - 1\) and \(j = 1,2 \ldots \ldots \ldots ..N - 1\), where \(M \times N\) denotes the cover image size and \(l\) denotes the index decimal data.
Let \(C_{i,j}\) denote the cover image with coordinates \(\left( {i,j} \right)\), and r denote the random binary sequence generated with the key ‘U’. To get the random decimal sequence \(k_{i,j}\), the L bits of the random binary sequence are grouped together and converted to decimal. To obtain the decimal data \(D_{l}\), the secret data is grouped in \(L\) bits and converted to decimal. The error is calculated using the cover image \(C_{i,j}\), which is also used to calculate the parameter α. The cover image \(C_{i,j}\) is arranged in a single row for continuous weight updating, and the weight can be modified on that single row.
Using Eqs. (11) and (12), the adaptive weight \(w_{i,j}\) is embedded on the cover image \(C_{i,j} \) to produce the stego images \(S_{i,j}^{^{\prime}}\) and \(S_{i,j}^{^{\prime\prime}}\).
Substituting the value of \(w_{i,j}\), the stego images can be estimated using the relation,
2.2 Proposed Extraction Scheme
The original cover image \(C_{i,j}\) is retrieved from the two stego images \(S_{i,j}^{^{\prime}}\) and \(S_{i,j}^{^{\prime\prime}}\) in the extraction process using the relation Eq. (15) (Fig. 2).
The Eq. (14) is subtracted from eqn and (15), to get Eq. 16 as
The decimal data \(D_{l}\) can be estimated using Eq. (17) from the above Eq. (16)
The data must be extracted in the reverse order from last to first. The last data and the last weight must be known to the extracting module for the complete recovery of data. The weight for preceding pixel pair can be estimated as using Eq. (18)
3 Experimental Results
MATLAB 2018a is used to apply the proposed reversible data hiding scheme, which uses four original images (Boat, Barbara, Cameraman, and Lena) as well as three confidential images (Cat, Pepper, Fruit,). As seen in Fig. 3, the cover image and the secret image are both 8 bit grayscale.
The proposed scheme’s performance is measured using image performance parameters such as embedding capability and visual consistency (PSNR).
The embedding rate of dual stegano images ‘R’ was calculated using Eq. (19) to evaluate the proposed method’s efficiency.
where S denotes the number of bits embedded in the image and MN denotes the cover image’s dimension. The PSNR between the cover image and the stego image is used to determine the visual consistency of the stego image. The dual stegano system will have two PSNR values because there are two stego images (PSNR1 and PSNR2). As eqn, the PSNR of the stego image is calculated using the equation as (20)
where MSE stands for mean square error, which is determined using Eqs. (21) and (22)
where \(C_{i,j}\) denotes the cover image and \(S_{i,j}^{^{\prime}}\) and \(S_{i,j}^{^{\prime\prime}}\) denote the stego image. Using Eq. (23), the average PSNR is determined from PSNR1 and PSNR2
The embedding capacity for L = 2 is greater than 5,23,000 bits, with a visual quality of more than 51.9 dB. Similarly, the embedding capacity for =2 is greater than 7,77,000 bits, with a visual quality of 47.7 dB.
The graphical comparison of embedding rate between different schemes and the proposed method is shown in Fig. 4.The graphical comparison for proposed method is depicted for \(L = 3\) and \(L = 4\). From Fig. 4, it is clear that the visual quality reduces as the embedding rate increases. Also, the lower values of \(L\) provides a higher PSNR throughtout different embedding rate when compared to higher values of \(L\). The performance of proposed framework is compared with other latest schemes and state-of-the art methods such as Ki-Hyun Jung [19], Wang et al. [20], Qin et al. [21] Chang et al. [22] and Chang et al. [15] as depicted in Table 1. The proposed scheme outperforms conventional schemes for L = 3 and L = 4 and over a range of embedding rates, as shown in Table 1 and Fig. 4.
4 Conclusion
Using an iterative weight update, this paper proposes a reversible data hiding approach on dual stego images. Iteratively, the weight is updated based on the error and the resulting data. To create dual stego images, the weight is then inserted in the cover pixels. The data is collected in the extraction process by calculating the inverse weight in reverse order. Metrics like embedding rate and PSNR are used to assess the algorithm’s success. The embedding capacity increases as the value of L increases, but the visual quality decreases. For L = 2 and L = 3, the proposed approach has an embedding capability of about 5,23,000 bits and 7,77,000 bits, respectively. In addition, for L = 2 and L = 3, the proposed approach offers an average PSNR of about 51.9 dB and 47.7 dB, respectively. When compared to other schemes, the proposed scheme offers a high embedding rate with high visual quality. In the future, we will apply our knowledge and skills to the development of a data embedding algorithm that is highly secure and robust and modifications.
References
Lu, T., Chang, T., Shen, J.: An Effective Maximum Distortion Controlling Technology in the Dual-image-based Reversible Data Hiding Scheme (2020). https://doi.org/10.1109/ACCESS.2020.2994244
Yao, H., Mao, F., Tang, Z., Qin, C.: High-fidelity dual-image reversible data hiding via prediction-error shift. Signal Process. 170, 107447 (2020). https://doi.org/10.1016/j.sigpro.2019.107447
Chang, C.-C., Kieu, T.D., Chou, Y.-C.: Reversible data hiding scheme using two steganographic images. TENCON 2007 - 2007 IEEE Reg. 10 Conference, pp. 1–4 (2007). https://doi.org/10.1109/TENCON.2007.4483783
Chang, C.C., Lu, T.C., Horng, G., Huang, Y.H., Hsu, Y.M.: A high payload data embedding scheme using dual stego-images with reversibility. In: ICICS 2013 - Conference Guid. 9th International Conference on Information, Communication and Signal Processing, pp. 1–5 (2013). https://doi.org/10.1109/ICICS.2013.6782790.
Kim, P., Ryu, K., Jung, K.: Reversible data hiding scheme based on pixel-value differencing in dual images 16 (2020). https://doi.org/10.1177/1550147720911006
Nikolaidis, A.: Reversible data hiding in JPEG images utilising zero quantised coefficients 9, 560–568 (2015). https://doi.org/10.1049/iet-ipr.2014.0689
Shastri, S., Thanikaiselvan, V.: Dual image reversible data hiding using trinary assignment and centre folding strategy with low distortion. J. Vis. Commun. Image Represent. 61, 130–140 (2019). https://doi.org/10.1016/j.jvcir.2019.03.022
Qin, C., Chang, C.-C., Hsu, T.-J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 74(15), 5861–5872 (2014). https://doi.org/10.1007/s11042-014-1894-5
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited 5, 201–214 (2010)
Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89, 1129–1143 (2009). https://doi.org/10.1016/j.sigpro.2008.12.017
Hong, W., Chen, M., Chen, T.S.: An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process. Image Commun. (2017). https://doi.org/10.1016/j.image.2017.07.001
Lu, T.C., Tseng, C.Y., Wu, J.H.: Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 108, 77–89 (2015). https://doi.org/10.1016/j.sigpro.2014.08.022
Li, X., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93, 198–205 (2013). https://doi.org/10.1016/j.sigpro.2012.07.025
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction 10, 781–783 (2006)
Yao, H., Qin, C., Tang, Z., Zhang, X.: A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 41 (2018). https://doi.org/10.1186/s13640-018-0281-y
Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19, 250–260 (2009). https://doi.org/10.1109/TCSVT.2008.2009252
Chi, L.-P., Wu, C.-H., Chang, H.-P.: Reversible data hiding in dual Stegano-image using an improved center folding strategy. Multimed. Tools Appl. 77(7), 8785–8803 (2017). https://doi.org/10.1007/s11042-017-4774-y
Weng, S., Pan, J., Li, L., Zhou, L.: Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding. Inf. Sci. (Ny). (2016). https://doi.org/10.1016/j.ins.2016.05.030
Li, M., Li, Y.: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process. (2016). https://doi.org/10.1016/j.sigpro.2016.07.002
Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on Multiple Histograms Modification 10, 2016–2027 (2016)
Lo, C., Hu, Y.: A novel reversible image authentication scheme for digital images. Signal Process. 98, 174–185 (2014). https://doi.org/10.1016/j.sigpro.2013.11.028
Tyagi, V.: Understanding Digital Image Processing. CRC Press, Boca Raton (2018). https://doi.org/10.1201/9781315123905.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Shaji, C., Sam, I.S. (2021). An Iterative Approach Based Reversible Data Hiding with Weight Update for Dual Stego Images. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T., Sonawane, V.R. (eds) Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1441. Springer, Cham. https://doi.org/10.1007/978-3-030-88244-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-88244-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-88243-3
Online ISBN: 978-3-030-88244-0
eBook Packages: Computer ScienceComputer Science (R0)