1 Introduction

With the improvement of information technology, secret data communication is raising over the internet for common users. During message transfer the secret data may be damaged, illegally observed, copied fraudulently, or stolen from sender to receiver or vice versa. Data hiding plays an important role in multimedia security. It is useful in various purposes such as copyright protection, covert communication, content authentication, forensic tracking, tamper detection and many other human centric applications. Due to the presence of hidden secret information, a cover image has some distortion that can’t be rectified in comparison with the original cover image. This distorted image affects the visual quality which is imperceptible from human eyes. This slight error is acceptable for the data hiding technique while it is unacceptable for some real field areas like remote sensing, medical and military images. According to whether the cover image pixels can be recovered or not after data extraction, current data hiding schemes are classified into two categories: reversible and irreversible. The scheme of reversible data hiding usually exploits the techniques of histogram shifting, prediction error, and difference expansion etc. After data extraction, irreversible methods are inadequate to reconstruct the real cover image whereas reversible methods can reconstruct the real image. In Reversible Data Hiding (RDH), not only the secret message but also the cover image is recovered from the stego image which is essential in many real life applications such as military, legal and medical images. RDH is generally a fragile approach for verification of quality and integrity, and is assessed by its efficiency of capacity-distortion. Recent times the demand for reliably secure, high-capacity transmission of information via hiding data is increasing. But shielding data will be a double-edged sword, since serious and criminal attackers would use it. Eavesdroppers can use this to disrupt social order, threaten public security and engage in illegal activity. Design of any defense scheme may not be enough, but guaranteeing protection is of paramount importance. When an eavesdropper causes secret information to be detected within a media then the information protection system will fail. In this paper, a reversible data hiding method has been proposed using center-folding combining with Directional Pixel Value Ordering (DPVO) to solved the issue related to secure hidden communication.

The rest of the paper is organized as follows. Literature review is explored in Section 2, motivations and objectives of the paper is mentioned in Section 2.1, contribution of the paper is enlisted in Section 2.2, the introduction of Peng et al.’s [23] and Lu et al.’s [17] algorithms are displayed in Section 3. The proposed data hiding procedures are discussed with numerical illustration in Section 4. The experimental results with performances are exposed in Section 5. Analyzing results with some steganographic attacks are exhibited in Section 6. Section 7 draws the conclusions.

2 Literature review

In recent years, several reversible data hiding schemes have been reported. Among them, Different Expansion (DE) is a very significant and popular technique suggested by Tian [29] in which secret data bits are concealed by modification a pair of pixel. Alattar [1], generalized Tian’s approach in 2004, by performing (n − 1) bits hiding within n pixels. The general DE method used reversible integer transform to embed secret data into a digital image. In multilayered embedding applications, this approach might degrade the image quality of the stego image. In 2008, Kim et al. [8] suggested a new DE transform using location map which is smaller than Tian’s location map. Thodi and Rodríguez [28] developed Prediction Error Expansion (PEE), which is the extension of DE, where pixel’s prediction error is considered to embed secret data instead of their difference, in such a way that the hiding capacity is increased twice compared with DE and reduce distortion due to much smaller value of perdition error. After that, many researchers developed, improved PEE based data embedding approach in various ways, for example using a map of the point of overflow based on payload [7], sorting and predictions [26], adaptive embedding [13], context incorporation [5], etc. Recently, Pixel Value Ordering (PVO) with Prediction Error Expansion (PEE) based information hiding approaches have been described by Li et al. [14] where minimal and maximal pixels are moderated during message embedding. The utilization of PVO in prediction error expansion helps to reduce the shifting pixels in an image. Use the second highest and second smallest pixels, the PVO method provided the estimation errors and integrates the hidden data into minimally and maximally weighted pixel resolution in a blockwise fashion. Hence, Li et al.’s RDH provides better visual quality. In order to further enhance the results, Peng et al. [23] proposed the notion of the relative location of the second peak value and the second low value with respect to highest and lowest pixel value in the frame, respectively, when evaluating the inaccuracy of estimation. Peng et al. [23] improved the PVO method presented by Li et al. [14]. They modified the Li et al.’s [14] difference amongst the first and second minimum or maximum value of a block by new difference technique as well as new histogram modification technique. Improving PVO method, Qu and Kim [25] presented Pixel-based Pixel Value Ordering (PPVO) scheme. This approaches uses pixels as foundation rather than regions where neighbour pixels are applied as reference. The minimal and maximal pixels are moderated for secret message bit embedding. An improved PVO based RDH method depended on multiple histograms is presented by Ou et al. [22]. This is a method of modification in adaptive histogram which is appropriate for histogram generation.

Lu et al. [17] suggested RDH scheme through center folding which reduces the secret symbol’s value. Many of the reversible data hiding techniques used to conceal secret data into hidden symbols form. If the value of the hidden symbols is too high, then difference between the stego-pixel with the original values will be high. Lu et al. [17] brought down the value of the secret symbols by folding technique, and embedding the folded hidden symbols in dual image, by an average process to improve the visual quality of the image. Further, Lu et al. [18] designed a multilayered architecture, where the hidden data is encoded into code pairs, then embedded within the interpolated pixel in such a way that it effectively reduce the image distortion. Meikap and Jana suggested a data hiding basing on interpolation scheme with Pixel Value Ordering (PVO). They modified PVO scheme and suggested generalized PVO with Direction called Directional PVO (DPVO) with varying block size. The scheme works for three directions that is horizontal, vertical and diagonal to increase the embedding capacity. Lee et al. [11] developed a lossless privacy preservation strategy, using centralized differential expansion to mask more hidden data into finer cover image areas and later he encoded a hidden message using the pixel center point position to get the stego-pixels. In order to preserve the image quality degradation, Lou et al. [15] have suggested Reduced Expansion of Differences (RDE) process. Lou’s scheme is not only reversible but also satisfies small processing costs with an embedding scheme for high capacity data. To get high payload, it utilized 2 copies of images through averaging formula. This method folds the secrets and then inserted into two stego-images. Meikap et al. [19, 20] presented RDH based PVO schemes which improved the payload. But, the challenges is to raise the payload by frequently embedding into overlapped pixels in different directions within an image block after fold the secret data and embed it into pixels. To overcome this challenges, we have proposed an improved center folding based information hiding technique through directional PVO (DPVO) with different block size.

2.1 Motivations and objectives of the paper

For adequate data hiding technique, the motivations of the proposed work are as follows:

  • (i) So far, most PVO based data hiding schemes hides at most two positions in a row of image block, that is the maximal and/or minimal position by comparing with the second maximal and/or minimal pixel. Hence, the motivation is to embed secret data bits in more than two positions in a row of the image block.

  • (ii) So far, many secret data hiding methods have been reported which utilizes single images. Hence, the motivation is to investigate PVO based data hiding schemes for multiple image with good visual quality.

  • (iii) PVO based scheme may be utilized to communicate secrets among sender and receiver. So far, it is not studied the secret data extraction from tampered stego images. This motivate us to investigate various tampered detection and extraction from stego images.

  • (iv) So far, it has been observed that the embedding capacity (EC) of PVO or center folding based technique was limited. This motivate us to improve embedding capacity in bits through PVO or center folding based technique.

  • (v) It has been observed that, data bits are embedded in the same pixel repeatedly is rare in PVO based data hiding scheme. This motivate us to embed secret data bits in same pixel repeatedly in such a way that we can easily retrieve secret data with out any fail.

  • (vi) The most challenging task on data hiding scheme is to retrieve the accurate secret data from overlapped stego pixel without any distortion. This motivate us to investigate data hiding scheme on overlapped pixel with multiple time embedding with successful extraction.

  • (vii) The security of the PVO based data hiding scheme is more challenging task which was not evaluated by earlier researchers. This motivate us to design a secured PVO based data hiding schemes.

The objectives of the proposed investigation are mentioned as follows:

  • (i) Embedding capacity: Capacity of embedded data bits should be high while keeping good visual quality. The objective of the proposed scheme is to embed more than two position in a row of any image block. In addition, high embedding is possible due to dual image with image interpolation schemes.

  • (ii) Imperceptibility: For stego image, it is necessary that anyone can’t perceive in mind the presence of secret message. So, imperceptibility is required for data hiding scheme. It is possible due to dual image and image interpolation.

  • (iii) Reversibility: After conceal the important secret message into cover image, it is responsible to extract the original secrets from the stego image as well as recover the original cover image otherwise the receiver can’t get the actual secret message. To embed and extract secret from more than one image is difficult assignment. Hence, our objective is to design dual image based reversible data hiding scheme with PVO and center folding scheme with good visual quality.

  • (iv) Robustness: The data hiding method must be maintained in such a fashion that, it should not be affected by various steganographic attacks. The proposed scheme is designed to achieve more than one time embedding in a same pixel. It has been possible for DPVO schemes which operated three directions that is horizontal, vertical and diagonal one after another.

  • (v) Tamper detection: A cover image may be corrupted or modified by any adversary. It should be discarded by the receiver. So, it is important to detect the presence of any tamper in stego image. So, the objective is to study tampered detection after embed secret data which is worth for medical and military image processing.

  • (vi) Enhanced security: Security should be increased to protect from various steganographic attacks. In existing PVO based schemes, there are some security loophole which need to acquire in a certain level for practical applications. Here, data set number, size of image block and number of image block are required to extract secret data which treat as secret keys without which it is impossible to retrieve desired secret message.

2.2 Contribution of the paper

The benefactions of this paper are described below:

  • (i) Imperceptibility: The proposed scheme achieve good visual quality with high embedding capacity. This is possible for data embedding within interpolated dual image. The PSNR is above 51 dB while p = 2, where p is the set of secret data bits.

  • (ii) Reversibility: The proposed algorithm is reversible because we can successfully take out both the hidden message and the cover image from dual marked images without any distortion. This is possible for maintaining maximum and minimum pixel modification even after the data embedding the pixel order remains the same.

  • (iii) Embedding capacity: It gives average embedding capacity above 6,00,000 bits where p = 2 while keeping good image quality. The data embedding is performed in two stages on dual image. In the first stage, center folding technique has been applied and in second stage DPVO has been is encountered.

  • (iv) Robustness: To examine the robustness of our proposed scheme, we evaluate RS analysis, SD, CC, SSIM, NCC, SC, NAE, BER, Q-index and several attacks like noise of salt and pepper, cropping, copy-move forgery and opaque. It has been observed that all those importance parameters of statistical evaluation offer promising results.

  • (v) Enhanced security: The proposed method uses a set of secret bits as the value of p, the number of image block as N and size of image block as π which are treated as secret keys and shared between sender and receiver as well as the secret data bits are embedded within dual images. The hidden data bits are hard to retrieve without simultaneous two stego images with correct values of secret keys p, N, and π which are hard to guess by adversary and computationally hard by recent computing devices.

3 Preliminaries

Here, reversible data hiding with PVO of Peng et al.’s scheme [23] and center folding with dual image of Lu et al.’s scheme [17] are concisely described.

3.1 Review of Peng et al.’s IPVO [23]

In 2014, Peng et al. [23] introduced an information hiding method called Improved Pixel Value Ordering (IPVO). In this method, two extremely valued pixels (i. e. minimal and maximal) are modified for message embedding. The 1st and 2nd smallest pixels are utilized to find out the Prediction-Error (PE) for embedding in minimum modification. The n th and (n − 1)th largest pixels are used to find out the Prediction-Error (PE) for embedding in maximum modification.

3.1.1 Embedding and extraction process based on minimum-modification

The details of message embedding in the minimum modification is as follows: The image is separated into several blocks and then sorted the pixels of each block in increasing sequence. Then compute

$$ \begin{array}{@{}rcl@{}} ER_{\min}=x_{b}-x_{c} \ \ \text{where} \ \ \left\{\begin{array}{lll} b=\min(\sigma(1),\sigma(2)), & \\ c=\max(\sigma(1),\sigma(2)). \end{array}\right. \end{array} $$
(1)

Now, the revised minimal pixel xσ(1) is gained by

$$ \begin{array}{@{}rcl@{}} x^{\prime}= \left\{\begin{array}{lll} x_{\sigma(1)}-a,\ \ \text{if}\ ER_{\min}=1\\ x_{\sigma(1)}-1,\ \ \text{if}\ ER_{\min}>1\\ x_{\sigma(1)}-a,\ \ \text{if}\ ER_{\min}=0\\ x_{\sigma(1)}-1,\ \ \text{if}\ ER_{\min}<0 \end{array}\right. \end{array} $$
(2)

where the bits a ∈ {0, 1} are inserted with pixel. The numerical instance of embedding is displayed in Fig. 1. The revised value of X is (y1,…, yn), where \(y_{\sigma (1)}=x^{\prime }\) and yi = xi for every iσ(1). The mapping σ keeps unaltered in decoder side. The extraction of bits and restoration of image processes are gained from the sorted pixels (y1,…, yn). Calculate the value of \(ER_{\min \limits }^{\prime }=y_{b}-y_{c}\), where (b, c) is described in (1).

Fig. 1
figure 1

Numerical example of IPVO scheme proposed by Peng et al. [23] for data embedding

If \(ER_{\min \limits }^{\prime }\leq 0\), then ybyc. As σ(1) < σ(2) then b = σ(1) with c = σ(2):

  • If \(ER_{\min \limits }^{\prime }\in \{-1,0\}\), it ensures the presence of concealed data bit \(a=-ER_{\min \limits }^{\prime }\). The minimal pixel is xσ(1) = yb + a;

  • If \(ER_{\min \limits }^{\prime }<-1 \), it ensures the absence of concealed message. The minimal pixel is xσ(1) = yb + 1.

If \(ER_{\min \limits }^{\prime }> 0\), then yb > yc. So, b = σ(2), c = σ(1) and here, σ(2) < σ(1):

  • If \(ER_{\min \limits }^{\prime }\in \{2,1\}\), it ensures the presence of concealed message \(a=ER_{\min \limits }^{\prime }-1\) and the minimal pixel is xσ(1) = yc + a;

  • If \(ER_{\min \limits }^{\prime }>2\), then absent hidden message and the minimal pixel is xσ(1) = yc + 1.

The insertion and removal process in maximum modification is discussed in [23].

The main limitation of the Peng et al.’s scheme [23] is that it can only insert at most two data bits in a row of a image block. To increase the embedding capacity, we have developed the proposed scheme which embed more than two data bits depending on the image block size.

3.2 Review of Lu et al.’s scheme [17]

Lu et al. [17] described a RDH method exploiting a center folding technique incorporated with a dual image. This scheme squeezes the hidden symbol through applying the center folding method before inserting it within dual marked images. Each bits of l from original hidden information is assembled as a set and turned into a secret decimal symbol h. To keep away from distortion, the range of secret decimal symbol is changed from M = {0,1…,2l − 1} to \(M^{\prime }=\{-2^{l-1},-2^{l-1}+1,\ldots ,0,\ldots ,2^{l-1}-2,2^{l-1}-1\}\) by using folding method. \(h_{s}^{\prime }\) can be computed by using the equation discussed in [17] where 2l− 1 is median values. When h < 2l− 1, the value of h will be smaller than 0 and was indicated as a negative sign. When h = 2l− 1, the value of h was indicated as 0. When h > 2l− 1, the hidden value \(h^{\prime }\) was indicated as a positive sign and it will be greater than 0.

These folded hidden symbol \((h^{\prime })\) was embedded into two marked images through averaging technique. The \(h^{\prime }\) was equally divided into two parts \(h_{1}^{\prime }\) and \(h_{2}^{\prime }\). These are inserted into real pixel xi, j to construct dual marked images \(x_{i,j}^{\prime }\) and \(x_{i,j}^{\prime \prime }\). In Lu’s scheme [17], the value range of the secret data is divided into two parts. One part consists of the negative folded values that is less than 0, and the other part consists of the folded positive values which is greater than 0. The largest value in each part is still very large, which can cause huge distortion. To remove the huge distortion one may use re-encoding by second phase embedding which has been designed in the proposed scheme. Here we have divided the data embedding stage into two phases: In first phases, we try to embed secret data through center folding with a proper data set number and then in second stage DPVO has been applied for embedding in overlapped pixel with repeated time.

4 Proposed method

This section represents the secret message inserting and taking out process through center folding and Directional PVO (DPVO) techniques where secrets are embedded to form stego images. The proposed method made up of two stages: (1) Embedding Procedure and (2) Extraction Procedure.

4.1 Notations

The following notations are used in this paper:

Notations:

Descriptions

CI:

Cover Image

IMI:

Interpolated Image

CI1:

Interpolated marked image − 1 after first embedding

CI2:

Interpolated marked image − 2 after first embedding

\(CI_{1}^{\prime }\):

Interpolated marked image − 1 after second embedding

\(CI_{2}^{\prime }\):

Interpolated marked image − 2 after second embedding

w:

Width of Cover Image

h:

Hight of Cover Image

Dpix:

Interpolated Pixel

p:

A set of secret bits

N:

Number of image block

π:

Size of image block

ds:

Hidden symbol in decimal form

Q:

Hidden decimal symbol’s range

\(Q^{\prime }\):

Modified hidden decimal symbol’s range

\(d_{s}^{\prime }\):

Folded hidden symbol

\(d_{s1}^{\prime }\):

Folded hidden symbol for image − 1

\(d_{s2}^{\prime }\):

Folded hidden symbol for image − 2

pixeli, j:

Pixel of cover image

\(pixel_{i,j}^{\prime }\):

Stego pixel of image − 1

\(pixel_{i,j}^{\prime \prime }\):

Stego pixel of image − 2

α:

A parameter for maintaining pixel order

\(d_{\min \limits _{f}}\):

Pixel differences between minimum pixels

\(d_{\max \limits _{f}}\):

Pixel differences between maximum pixels

\(d_{\min \limits _{f}}^{\prime }\):

Modified pixel differences between minimum pixels

\(d_{\max \limits _{f}}^{\prime }\):

Modified pixel differences between maximum pixels

D:

Hidden Message

EC:

Embedding Capacity

EC1:

Embedding Capacity in image − 1

EC2:

Embedding Capacity in image − 2

SC:

Structure Content

NAE:

Normalized Absolute Error

BER:

Bit Error Rate

CC:

Correlation Coefficient

SD:

Standard Deviation

SSIM:

Structural SIMilarity

NCC:

Normalized Cross-Correlation

PSNR:

Peak Signal-to-Noise Ratio

PSNR1:

Peak Signal-to-Noise Ratio for image − 1

PSNR2:

Peak Signal-to-Noise Ratio for image − 2

4.2 Embedding procedure

The secret data are embedded in two phases. In the first phase, center folding scheme has been used and in second phase Directional PVO has been utilized. The cover image represents to CI = {pixel1,1, pixel1,2, pixel1,1,…, pixelw, h}, where w and h denoted image width and height, respectively. We expand this image through the interpolation method shown in Fig. 2 by averaging the neighbor pixels using the following (3).

Fig. 2
figure 2

Construction of interpolated pixels with green color that represents interpolated row and column

$$ \begin{array}{@{}rcl@{}} \left\{\begin{array}{ll} D_{pix1} =(pixel_{1}+pixel_{2} ) / 2\\ D_{pix2} =(pixel_{1}+pixel_{3} ) / 2\\ D_{pix3} =(pixel_{1}+pixel_{2}+pixel_{3}+pixel_{4} ) / 4\\ D_{pix4} =(pixel_{2}+pixel_{4} ) / 2\\ D_{pix5} =(pixel_{3}+pixel_{4} ) / 2 \end{array}\right. \end{array} $$
(3)

If image size is (v × v) then the interpolated image will be (v + (v − 1)) × (v + (v − 1)), where interpolated row/column is (v − 1). One is added to both row and column to form an even number of row and column and copying the last row and column value. The hidden information accepts each bit of p as a set and modifies into a hidden symbol ds in decimal form. To keep away from image distortion, compress the hidden symbol ds and modify the hidden decimal symbol’s range from Q = {0,1…,2p − 1} to \(Q^{\prime }=\{-2^{p-1},-2^{p-1}+1,\ldots ,-1,0,1,\ldots ,2^{p-1}-2,2^{p-1}-1\}\). The folded hidden symbol \(d_{s}^{\prime }\) can be calculated as follows:

$$ \begin{array}{@{}rcl@{}} d_{s}^{\prime}=d_{s}-2^{p-1} \end{array} $$
(4)

where 2p− 1 represents intermediary values. By using (4), ds is changed into folded \(d_{s}^{\prime }\).

  • If ds = 2p− 1, then the value of \(d_{s}^{\prime }\) is indicated as 0.

  • If ds > 2p− 1, then the value of \(d_{s}^{\prime }\) is indicated as a positive sign and it will be greater than 0.

  • If ds < 2p− 1, then the value of \(d_{s}^{\prime }\) is indicated as a negative sign and it will be smaller than 0.

The secret data embedding process can be accomplished by

$$ \left\{\begin{array}{l} d_{s1}^{\prime} =\left \lfloor \frac{d_{s}^{\prime}}{2} \right \rfloor ,\\\\ d_{s2}^{\prime} =\left \lceil \frac{d_{s}^{\prime}}{2} \right \rceil . \end{array}\right. $$
(5)

where \(d_{s1}^{\prime }\) and \(d_{s2}^{\prime }\) are derived from \(d_{s}^{\prime }\). These values \((d_{s1}^{\prime },d_{s2}^{\prime })\) are inserted into pixel value pixeli, j to construct dual interpolated marked (stego) pixels as \(pixel_{i,j}^{\prime }\) and \(pixel_{i,j}^{\prime \prime }\). Thus, two interpolated marked images are constructed using the equations given below.

$$ \begin{array}{@{}rcl@{}} \left\{\begin{array}{ll} pixel_{i,j}^{\prime}=pixel_{i,j}+d_{s1}^{\prime},\\ pixel_{i,j}^{\prime\prime}=pixel_{i,j}-d_{s2}^{\prime}, \end{array}\right. \end{array} $$
(6)

The secret massage bits hide into image pixels that belong in between 2p− 1 and 256 − 2p− 1.

Now, first phase message embedding is completed successfully. Then we have started the second phase of message embedding through the Directional PVO (DPVO) method. In this second phase, dual interpolated marked (stego) images are breaking into non-overlapping blocks where all pixels are arranged in ascending ordered. There is a possibility to change the order of pixel due to modification in more than two pixel values in a row, which may create problem during data extraction. To maintain the rank of sorting order, we have proposed a new parameter α. We subtract a new parameter α from 1st, 2nd and so on smallest pixels and add the α to 1st, 2nd and so on largest pixel values. The value of α is dependent on the block size. If the block size is increases the maximum value of α will be increases. After each inclusion or exclusion with the pixel, the α decreases by one until it reaches to zero value. If the block size is v, then interpolated block is (2v − 1) where (v − 2) is the maximal value and 0 is the minimum value of α. In this context, we have proposed Lemma-1 which has been used during data embedding.

Lemma 1

If the size of block is (2v − 1) and sorted pixels in increasing manner is (pixel1, pixel2, pixel3,…, pixel2v− 3, pixel2v− 2, pixel2v− 1), then the changed pixel value is (pixel1α(v− 2), pixel2α((v− 2)− 1), pixel3α((v− 2)− 2),…, pixelv− 1α((v− 2)−(v− 2)), pixelv, pixelv+ 1+α((v− 2)−(v− 2)),…, pixel2v− 3+α((v− 2)− 2), pixel2v− 2+α((v− 2)− 1), pixel2v− 1+α(v− 2)), where, the value of α((v− 2)−(v− 2)) = ((v − 2) − (v − 2)). The maximal and minimal value are (v − 2) and 0 respectively.

Example 1

Let block size is (2 × 2), so size of interpolated block is (3 × 3). The α’s maximal value is 0(as (v − 2) = 0). It is added and subtracted to and from the pixel of maximal and minimal respectively. This activity still going on until (α) = 0 which is denoted in Fig. 3.

Fig. 3
figure 3

Block diagram for data adjustment using Lemma 1 during data embedding

Hidden data are inserted into the pixels of image block in distinct way (i.e. Horizontal, Vertical and Diagonal). The procedure is defined below:

4.2.1 Embedding in minimum-modification

In every row of a block X, assume that n pixels (pixel1,…, pixeln) are sorted in rising up order to get (pixelσ(1),…, pixelσ(n)). We compute

$$ \begin{array}{@{}rcl@{}} d_{\min_{f}}=pixel_{b}-pixel_{c}, \ \ \text{where} \ \ \left\{\begin{array}{lll} c=\max(\sigma((2)+f),\sigma((1)+f)), &\\ b=\min(\sigma((2)+f),\sigma((1)+f)), & \\ f=(0,1,2,3,\ldots,\text{fix}(n/2)-1). \end{array}\right. \end{array} $$
(7)

To round the data toward zero, we use fix().

  • When σ((2) + f) < σ((1) + f), the value of b = σ((2) + f) with c = σ((1) + f), where \(d_{\min \limits _{f}}>0\).

  • When σ((1) + f) < σ((2) + f), the value of b = σ((1) + f) wth c = σ((2) + f), where \(d_{\min \limits _{f}}\leq 0\).

The \(d_{\min \limits _{f}}\) is changed using following formula

$$ \begin{array}{@{}rcl@{}} d_{\min_{f}}^{\prime}=\left\{\begin{array}{lll} d_{\min_{f}}-1,\ \ \text{if}\ d_{\min_{f}}<0 & \\ d_{\min_{f}}-D,\ \text{if}\ d_{\min_{f}}=0 & \\ d_{\min_{f}}+D,\ \text{if}\ d_{\min_{f}}=1 & \\ d_{\min_{f}}+1,\ \ \text{if}\ d_{\min_{f}}>1 & \end{array}\right. \end{array} $$
(8)

where D ∈ {0,1} are inserted into pixel. In each operation, α is changed. The modified minimum value is derived by

$$ \begin{array}{@{}rcl@{}} pixel^{\prime}=pixel_{\sigma((2)+f)}-\alpha-|d_{\min_{f}}^{\prime}|= \left\{\begin{array}{lll} (pixel_{\sigma((1)+f)}-\alpha)-1,\ \ \text{if}\ d_{\min_{f}}<0\\ (pixel_{\sigma((1)+f)}-\alpha)-D,\ \text{if}\ d_{\min_{f}}=1\\ (pixel_{\sigma((1)+f)}-\alpha)-D,\ \text{if}\ d_{\min_{f}}=0\\ (pixel_{\sigma((1)+f)}-\alpha)-1,\ \ \text{if}\ d_{\min_{f}}>1 \end{array}\right. \end{array} $$
(9)

Assume the changed value of X=(cpixel1, cpixel2,…, cpixeln) in each row, where \(cpixel_{\sigma ((1)+f)}=pixel^{\prime }\) and cpixeli = pixeli for all iσ((1) + f) and the changed value of X=(CR1, CR2,…, CRn) in each column, where \(CR_{\sigma ((1)+f)}=cr^{\prime }\) and CRi = cri for all iσ((1) + f).

4.2.2 Embedding in maximum-modification

figure a

The data inserting into pixels for Maximum-Modification is discussed below: Calculate,

$$ \begin{array}{@{}rcl@{}} d_{\max_{f}}=pixel_{d}-pixel_{e}\ \ \text{where}\ \ \left\{\begin{array}{lll}e=\max(\sigma((n-1)-f),\sigma((n)-f)),\\ d=\min(\sigma((n-1)-f),\sigma((n)-f)),\\ f=(0,1,2,3,\ldots,\text{fix}(n/2)-1). \end{array}\right. \end{array} $$
(10)
  • When σ((n) − f) < σ((n − 1) − f), then value of c = σ((n) − f) with e = σ((n − 1) − f). Here, \(d_{\max \limits _{f}}>0\).

  • When σ((n − 1) − f) < σ((n) − f), then value of c = σ((n − 1) − f) with e = σ((n) − f). Here, \(d_{\max \limits _{f}}\leq 0\).

The \(d_{\max \limits _{f}}\) is changed to \(d_{\max \limits _{f}}^{\prime }\) by following formula

$$ \begin{array}{@{}rcl@{}} d_{\max_{f}}^{\prime}=\left\{\begin{array}{lll} d_{\max_{f}}-1,\ \ \text{if}\ d_{\max_{f}}<0\\ d_{\max_{f}}+D,\ \text{if}\ d_{\max_{f}}=1\\ d_{\max_{f}}-D,\ \text{if}\ d_{\max_{f}}=0\\ d_{\max_{f}}+1,\ \ \text{if}\ d_{\max_{f}}>1 \end{array}\right. \end{array} $$
(11)

where D ∈ {0,1} are inserting bits. The changed maximum pixel value \(pixel^{\prime }\) is derived by

$$ \begin{array}{@{}rcl@{}} pixel^{\prime} = pixel_{\sigma((n-1)-f)}+\alpha+|d_{\max_{f}}^{\prime}|= \left\{\begin{array}{lll} (pixel_{\sigma((n)-f)}+\alpha)+1,\ \ \text{if}\ d_{\max_{f}}<0\\ (pixel_{\sigma((n)-f)}+\alpha)+D,\ \text{if}\ d_{\max_{f}}=1\\ (pixel_{\sigma((n)-f)}+\alpha)+D,\ \text{if}\ d_{\max_{f}}=0\\ (pixel_{\sigma((n)-f)}+\alpha)+1,\ \ \text{if}\ d_{\max_{f}}>1 \end{array}\right.\\ \end{array} $$
(12)

Assume the changed value of X=(cpixel1, cpixel2,…, cpixeln) in each row, where \(cpixel_{\sigma ((n)-f)} = pixel^{\prime }\) and cpixeli = pixeli for all iσ((n) − f) and the changed value of X=(CR1, CR2,…, CRn) in each column, where \(CR_{\sigma ((n)-f)} =cr^{\prime }\) and CRi = cri for all iσ((n) − f). After embedding horizontally, then the above minimum and maximum process follow in vertical and diagonals ways to form the final stego images. In the second phase of the data embedding procedure, the maximum and minimum pixels have been changed in three distinct directions one after another. The overall hidden message embedding process is displayed in Fig. 4. Figure 4a depicts the original cover image and after interpolation it is converted to interpolated cover image as (b). After that, this interpolated image used for data embedding through the center folding method which produces dual marked images as shown in (c) and (d). These two images as (c) and (d) are used for second phase data embedding using DPVO method which produces final dual stego images as (e) and (f) respectively. The suggested secrets embedding algorithm is following in Algorithm 1. We have taken one cover image and generate interpolated image following step-1. In step-2, we have choose p as a set of secret data and then converted it in equivalent decimal value. Construct folded hidden symbols and embedded within dual images is described in step-3 and step-4. First stage data embedding has been completed using center folding scheme and dual intermediate stego image is generated. Now, in step-5, image is partitioned into non-overlapping N blocks and step-6 describe data hiding procedure using DPVO.

Fig. 4
figure 4

Overall data embedding process in proposed improved center folding based DPVO scheme

4.3 Numerical demonstration of embedding activity

We present a numerical example to explain the suggested embedding activity. For input, we use a (2 × 2) real cover image. Then, construct an interpolated cover image of size (3 × 3) by (3) as IMI from the cover image. Using the center folding method, dual marked images CI1 and CI2 of size (3 × 3) are constructed.

Let the hidden message is ‘00100001000110001110010110001000’ which we like to hide. We take here, the value of p is 3. Using (4), (5) and (6), the dual images are constructed shown in Fig. 5.

Fig. 5
figure 5

Numerical example of two phase data embedding

Then, the second phase of message embedding takes place into the dual marked images. This process takes place through three distinct directions (i. e. row, column, first and second diagonal) one after another. Finally, two marked images \(CI_{1}^{\prime }\) and \(CI_{2}^{\prime }\) are made as shown in Fig. 5.

4.4 Extraction procedure

In data extraction, reverse order direction will occur. This process establishes from the diagonal direction of the interpolated marked image. α is added and subtracted to and from the minimal and maximal pixel of 1st, 2nd and so on respectively, which is dependent on the Lemma 2:

Lemma 2

Assume, the size of image block is (2v − 1) and ordered pixels in increasing manner is \((pixel_{1}^{\prime },pixel_{2}^{\prime },pixel_{3},\ldots ,pixel_{2v-3}^{\prime },pixel_{2v-2}^{\prime },pixel_{2v-1}^{\prime })\), then the changed pixel value is \((pixel_{1}^{\prime }+\alpha _{(v-2)},pixel_{2}^{\prime }+\alpha _{((v-2)-1)},pixel_{3}^{\prime }+\alpha _{((v-2)-2)},\ldots ,pixel_{v-1}^{\prime }+\alpha _{((v-2)-(v-2))},pixel_{v}^{\prime },pixel_{v+1}^{\prime }-\alpha _{((v-2)-(v-2))},\ldots ,pixel_{2v-3}^{\prime }-\alpha _{((v-2)-2)},pixel_{2v-2}^{\prime }-\alpha _{((v-2)-1)},pixel_{2v-1}^{\prime }-\alpha _{(v-2)})\). Whenever, the α((v− 2)−(v− 2)) = ((v − 2) − (v − 2)). The maximal and minimal values are (m − 2) and 0 respectively.

Example 2

Let block size is (2 × 2), so size of interpolated block is (3 × 3). The α’s maximal value is (v − 2) = 0, that is added and subtracted to and from the pixel of minimal and maximal respectively. This activity still going on until (α) = 0, which is denoted in Fig. 6.

figure b
Fig. 6
figure 6

Block diagram for data adjustment using Lemma 2 during data extraction

4.4.1 Extraction in minimum-modification

Hidden data extraction and rebuild of image are carried out through minimum pixel modification. Assume the changed value is (cpixel1, cpixel2,…, cpixeln). The mapping σ lasts unchanged. We calculate \(d_{\min \limits _{f}}^{\prime }=cpxel_{b}-cpixel_{c}\), where (b, c, f) are discussed in (7).

  • When \(d_{\min \limits _{f}}^{\prime }\leq 0\), then cpixelbcpixelc. Here, b = σ((1) + f), c = σ((2) + f) with σ((1) + f) < σ((2) + f):

    • When \(d_{\min \limits _{f}}^{\prime }\in \{-1,0\}\), it ensures the presence of concealed data bit \(D=-d_{\min \limits _{f}}^{\prime }\). Restored minimal pixel is pixelσ((1)+f) = (cpixelb + α) + D;

    • When \(d_{\min \limits _{f}}^{\prime }<-1 \), then, no hidden message present and restored the minimal pixel is pixelσ((1)+f) = (cpixelb + α) + 1.

  • When \(d_{\min \limits _{f}}^{\prime }> 0\), then cpixelb > cpixelc. Here, c = σ((1) + f), b = σ((2) + f) with σ((1) + f) > σ((2) + f):

    • When \(d_{\min \limits _{f}}^{\prime }\in \{2,1\}\), it ensures the presence of concealed data bit \(D=d_{\min \limits _{f}}^{\prime }-1\). Recovered minimal pixel is pixelσ((1)+f) = (cpixelc + α) + D;

    • if \(d_{\min \limits _{f}}^{\prime }>2\), then, no hidden message present and the original minimal pixel is pixelσ((1)+f) = (cpixelc + α) + 1.

4.4.2 Extraction in maximum-modification

Assume the changed values are (cpixel1, cpixel2,…, cpixeln). The mapping σ lasts unchanged. We calculate \(d_{\max \limits _{f}}^{\prime } = cpixel_{d}-cpixel_{e}\) where (d, e, f) is discussed in (10).

  • When \(d_{\max \limits _{f}}^{\prime }\leq 0\), then cpixeldcpixele. Here, σ((n − 1) − f) < σ((n) − f) with d = σ((n − 1) − f), e = σ((n) − f):

    • When \(d_{\max \limits _{f}}^{\prime }\in \{-1,0\}\), it ensures the presence of concealed data bit \(D=-d_{\max \limits _{f}}^{\prime }\). Recovered maximum pixel piixelσ((n)−f) = (cpixeleα) − D;

    • When \(d_{\max \limits _{f}}^{\prime }<-1 \), then, no hidden message present and restored the maximum pixel is pixelσ((n)−f) = (cpixeleα) − 1.

  • When \(d_{\max \limits _{f}}^{\prime }> 0\), then, cpixeld > cpixele. Now, σ((n − 1) − f) > σ((n) − f) with d = σ((n) − f), e = σ((n − 1) − f):

    • When \(d_{\max \limits _{f}}^{\prime }\in \{2,1\}\), it ensures the presence of concealed data bit \(D=d_{\max \limits _{f}}^{\prime }-1\). The original pixel(maximum) is pixelσ((n)−f) = (cpixeldα) − D;

    • When \(d_{\max \limits _{f}}^{\prime }>2 \), then, no hidden data present and recovered the maximum pixel pixelσ((n)−f) = (cpixeldα) − 1.

This extraction procedure begins from 2nd diagonal of the marked block. After that, 1st diagonal line, vertical line, and horizontal line directions are utilized to take out hidden data from both interpolated marked images. Now, we recover the previous-valued pixel from both stego pixel \(pixel_{i,j}^{\prime }\) and \(pixel_{i,j}^{\prime \prime }\) of \(CI_{1}^{\prime }\) and \(CI_{2}^{\prime }\) marked images respectively by following formulas

$$ \begin{array}{@{}rcl@{}} d_{s}^{\prime}=pixel_{i,j}^{\prime}-pixel_{i,j}^{\prime\prime} \end{array} $$
(13)
$$ \begin{array}{@{}rcl@{}} d_{s}=d_{s}^{\prime}+2^{p-1} \end{array} $$
(14)

where p is a number of hidden bits makes a group. The real pixel pixeli, j is rebuild as follows

$$ pixel_{i,j} =\left\lceil \frac{pixel_{i,j}^{\prime}+pixel_{i,j}^{\prime\prime}}{2}\right\rceil $$
(15)

We can restore the real cover image CIw×h from IMI(2w− 1)×(2h− 1) interpolated image by eliminating all interpolated rows and columns. The message extraction and image rebuild are explored in Fig. 7. In Fig. 7a and b depicts the stego images for data extraction process. These (a) and (b) images are utilized for first data extraction using DPVO method which produces (c) and (d) images respectively. After that, (c) and (d) images goes through second extraction process using the center folding method which produces the interpolated image. The original cover image shown in (e) that is constructed through elimination of interpolate row and column from the interpolated image. The extraction algorithm is explored in Algorithm 2. Here, at first dual stego images are partitioned into non-overlapping N blocks and DPVO has been applied which are enlisted in step-2. Within step-3, first phase of hidden data extraction has been done and intermediate dual stego images are recovered. Step-4 to step-6 describe second phase data extraction through center folding technique and finally original cover image is reconstructed as per step-7.

Fig. 7
figure 7

Overall data extracting process in proposed improved center folding based DPVO scheme

4.5 Numerical demonstration of extraction activity

We consider a numerical illustration to explain the extraction activity. For an input, we use two interpolated marked (stego) images \(CI_{{1}_{(2w-1)\times (2h-1)}}^{\prime }\) and \(CI_{{2}_{(2w-1)\times (2h-1)}}^{\prime }\) shown in Fig. 8.

Fig. 8
figure 8

Numerical example of data extraction

The first stage of extraction process passes through the second and first diagonal, column and row direction one after other of each interpolated stego images. Collect all the pixels and message from the stego images. This process makes \(CI_{{1}_{(2w-1)\times (2h-1)}}\) and \(CI_{{2}_{(2w-1)\times (2h-1)}}\) marked images shown in Fig. 8. Then, using (13), (14) and (15), again restore the hidden message and real interpolated cover image IMI(2w− 1)×(2h− 1) from dual marked images \(CI_{{1}_{(2w-1)\times (2h-1)}}\) and \(CI_{{2}_{(2w-1)\times (2h-1)}}\). Finally, the hidden message ‘00100001000110001110010110001000’ is restored as explored in Fig. 8.

5 Experiment results and comparisons

This paper used different standard gray-scale images from distinct databases. Only 10 images were used from USC-SIPI [31], 24 images were used from Kodak [9], 20 images were used from the Berkeley Segmentation Dataset and Benchmark [30] and 20 images were used from the National Library of Medicine [27] to examine the method. Only 10 standard images from each database are shown in Fig. 9. The image size of our scheme is (256 × 256). Distinct datasets are utilized for the best study of the efficacy of the submitted method. Method of message embedding and removal techniques are evaluated through MATLAB R2014a (8.3.0.532). The payload with image quality is measured by PSNR (dB) to determine the difference between real and marked images. The PSNR is derived via mean squared error (MSE). The MSE is obtained by the following equation

$$ \text{MSE} = \frac{1}{w\times h}\times \sum\limits_{i=1}^{w}\sum\limits_{j=1}^{h} (c_{i,j}^{\prime} - c_{i,j})^{2} $$
(16)

The PSNR (dB) is obtained by

$$ \text{PSNR}= 10 \log_{10} \left( \frac{255^{2}}{\text{MSE}} \right) $$
(17)

We test our suggested method through structure content (SC) technique. This method evaluates the structural similarity of the cover and stego images. It is obtained by the following equation

$$ \text{SC} = \frac{{\sum}_{i=1}^{w} {\sum}_{j=1}^{h}(c_{i,j}^{\prime})^{2}}{{\sum}_{i=1}^{w} {\sum}_{j=1}^{h}(c_{i,j})^{2}} $$
(18)

The value of SC is nearer to 1, means the cover and stego images are similar. A larger value of SC presents poor quality of image. Normalized absolute error (NAE) checks the distance of stego from cover image. It is computed by

$$ \text{NAE} = \frac{{\sum}_{i=1}^{w}{\sum}_{j=1}^{h}(| c_{i,j}-c_{i,j}^{\prime} | )} {{\sum}_{i=1}^{w} {\sum}_{j=1}^{h}(c_{i,j})} $$
(19)

We also evaluate the proposed scheme by evaluating Q-index(Q) and bit error rate (BER). BER finds the differences amongst original secrets and recovered secrets. It is obtained by

$$ \text{BER}= \frac{1}{W \times H} \begin{bmatrix} {\sum}_{i=1}^{W}{\sum}_{j=1}^{H}S_{i,j} \oplus S_{i,j}^{\prime} \end{bmatrix} $$
(20)

where the size of secret image is S(W×H) and after recover from stego image, it is \(S_{(W\times H)}^{\prime }\).

Fig. 9
figure 9

The standard grayscale images from four distinct sets are used as message embedding and extracting procedure

After hiding 6,29,955 bits, we achieve the quality measured by PSNR of the Lena image is 52.01 dB given in Table 1. To evaluate number of hidden message bits inserted into stego image, we calculate Bit per pixel (BPP). The BPP obtained by

$$ \text{BPP}=\frac{\text{EC}}{2\times w \times h} $$
(21)

where embedding capacity is EC. The increasing of BPP shows the increasing ability of data hiding shown in Table 1.

Table 1 The secrets embedding(EC) with distinct pay load (bits) of 10 USC-SIPI gray-scale images with average PSNR (dB) and bit per pixel (BPP)

The suggested method has been applied on ten (10) USC-SIPI gray-scale images through SC, NAE, Q-index, BER techniques. Table 2 displays several measurements of the suggested method. It shows the SC and NAE value are 0.9859 and 0.00762 respectively, while p = 2. When p = 3, then, more data are inserted into the cover image which causes slight changes in SC and NAE values (0.9814 and 0.00812 respectively). It also shows in Table 2 that all SC values are close to 1 and NAE values are very small. This means that the suggested method performs well in these measurements.

Table 2 The different measurement techniques of the suggested scheme on 10 USC-SIPI gray-scale images

The data insertion activity is depending on the value of p with the block size. It is noticed that the scheme is best for a small value of p and larger block size (π) compared with other maximum value of p and small value of block size (π) but bit capacity is lower shown in Table 1. For example, when p = 2, then, 6,29,955 bits are inserted with an average PSNR 52.01 (dB) and BPP 1.20. When p = 3, then, 9,04,197 bits are inserted with average PSNR 48.95 (dB) and BPP 1.72 whereas, 11,54,588 bits are inserted with average PSNR 46.70 (dB) and BPP 2.20 when p = 4 for Lena image.

The exploratory results in terms of PSNR of distinct databases are looked into in Table 3 when p = 2. This table describes the PSNR is above 45 dB when the inserted message is over 5,80,000 bits.

Table 3 The results evaluated by PSNR (dB) with payload in bits of different databases

The comparisons measured in PSNR (dB) among several PVO-based technique and proposed scheme are listed in Table 4. The proposed algorithm increases secrets embedding capacity (EC) contrast with another PVO-based schemes. The outcome of suggested technique is differ from other PVO-based method explained by Chang et al. [2,3,4], Lee et al. [10, 12], Qin et al. [24], Lu et al. [16, 17]. The hidden message capacity is 379909, 379909, 511317, 343396, 101302, 347145, 379909 and 117765 bits greater than Chang et al. [2], Chang et al. [3], Lee et al. [12], Lee et al. [10], Chang et al. [4], Qin et al. [24], Lu et al. [16] and Lu et al. [17] respectively for image Lena while value of p is 3 presented in Table 4. Figure 10 describes the differentiation graph with secrets payload for several images. It is inspected that the outcome of this paper is superior compared to another existing PVO in terms of payload while quality of image is unchanged. It is also cleared that the quality of image in PSNR (dB) is greater than other existing schemes shown in Fig. 11.

Fig. 10
figure 10

Comparisons of bit capacity among the methods of Lee et al. [10], Chang et al. [4], Qin et al. [24], Lu et al. [16, 17] and proposed method with p = 3

Fig. 11
figure 11

Comparisons of image quality in PSNR(dB) among the methods of Lee et al. [10], Chang et al. [4], Qin et al. [24], Lu et al. [16, 17] and proposed method with p = 2

Table 4 Comparison among the other schemes and the proposed scheme with image quality in PSNR(dB) as well as embedding capacity(EC) in bits

In our proposed scheme, we generate dual images from a single cover image. We embed secrets using center folding, and PVO techniques where the set of secret code (p), the number of image block (N), and the size of image block (π) plays an important role. Here, dual images are created using the center folding method. Using the proposed scheme, there must need the above-said parameters while secrets are extracted from dual stego images. At the receiver end, if we change the image block size (π) rather than original then the extracted bits are exchanged.

We also evaluate our proposed method with an additional UCID image database [21]. We select 400 images of (256 × 256) from each of UCID, BSDS, National Library of Medicine image databases randomly. The particulars provided in the distinct columns of Table 5 is: Image Database, Bit rate, True Positives (TP), False Positives (FP), True Negatives (TN), False Negatives (FN) and accuracy (in percentage). It is remembered that there are only 400 cover images and 400 stego (marked) images are utilized for the experiments given below. Here, TP + FN = 400 and TN + FP = 400 always.

Table 5 True positive(TP), false positive(FP), true negative(TN), false negative(FN) and accuracy(ACC) values of the proposed method for 400 test images of each data set using different bit rate

6 Steganographic attacks

Steganalysis is a skill of finding a secret message in suspected image. Although, steganographic skill does not perform perfect security. So, it leaves a hint of data inserting in stegogramme. It offers a fruitful way of recognizing the presence of secrets into cover media. A steganalyst performs this action using several ways which are classified as: Targeted steganalysis and Blind steganalysis. The structural attack, statistical attack, and visual attack, etc. are examples of targeted steganalysis while one of the important blind steganalysis methods is Regular Singular (RS) analysis suggested by J. Fridrich [6]. We examined the marked images using RS analysis [6]. The statistical attacks and histogram attacks are studied to evaluate the innocuousness as well as robustness.

6.1 RS analysis

The marked images are tested using RS analysis [6] for the further analysis. The value of RS is nearer to 0 describes less modification with predicted more secure. Table 6 enlisted that both of RM, RM and SM, SM are nearby same. So, RMRM with SMSM rules are fulfilled for the marked images which are more secure in opposition to RS attack.

Table 6 RS analysis of marked images

6.2 Histogram attack

The histogram of the cover and marked images for Lena image are shown in Fig. 12. The marked images are derived from interpolated image engaging higher secrets hiding. Also, it is noticed that the histogram shape maintains after message embedding. This ensures the minimum distortion and here is absence of step pattern that establish the robustness in opposition to histogram attacks.

Fig. 12
figure 12

Histogram difference of cover and marked image for Lena in USC-SIPI data base [31]

6.3 Statistical attack

In this analysis, we evaluate the robustness of the suggested scheme using hiding the secrets. This method is shielded from several attacks because of containing none of the adverse effects. We calculate the correlation coefficient (CC) and standard deviation (SD) displayed in Tables 7 and 8, respectively. Here, the CC and SD are determined through the interpolated real image together with the stego. The result shows that the CC is nearby 1, which establishes maximum security for secrets. It also displays in Table 8 that, the SD is nearby to 0, which establishes maximum security for secrets. The suggested scheme gained beneficial power against attacks. The cover image together with the secrets is regained from dual stego images without any kind of data loss.

Table 7 The correlation coefficient(CC) between the original and marked image
Table 8 The standard deviation(SD) between the original and marked images

6.4 Structural similarity index and normalized cross-correlation

The process for examining the similarity between the real and the stego images is known as the structural similarity (SSIM) index. This method is built upon 3 keys as contrast, structural with luminance key. The SSIM is the combination of three keys. To observed some patterns in-between real and stego images, there needs of normalised cross-correlation (NCC). It is utilized for block matching fields, image registration with video as well as image compression, etc. The SSIM and NCC values are explored in Table 9.

Table 9 The data bit capacity(EC) of four different image databases with structural similarity(SSIM) index and normalized cross-correlation(NCC)

6.5 Tamper detection and image recovery

For the robustness of our proposed scheme, we evaluated PSNR, SD, CC in the presence of several noise levels such as noise from salt and pepper, cropping, and copy-move forgery attacks. Figures 1314 and 15 displays the experimental outcomes after using salt and pepper, cropping as well as copy-move forgery attack respectively, with distinct noise intensity. After secrets taking out, the extracted secret image is marginally changed where the location of tamper in the restored image is recognized successfully. The results SD and CC show the robustness of the proposed scheme.

Fig. 13
figure 13

Cover image and data restoration using different level of salt and pepper noise on Sailboat_on_lake image

Fig. 14
figure 14

Cover image and data restoration using different level of cropping on Sailboat_on_lake image

Fig. 15
figure 15

Cover image and data restoration using copy-move forgery on Sailboat_on_lake image

7 Conclusions and future works

This paper proposed an improved center folding technique through Directional PVO for reversible data hiding with different sizes of p(set of data) and image block. The algorithms for data inserting and removing are developed in a manner so that huge messages are inserted and removed to and from images respectively. The suggested scheme carries out reliable message communication as inserting the secrets among dual images. Using our method, we get an average PSNR value above 51 dB and an average embedding capacity above 6,00,000 bits when p = 2. The proposed method carries out satisfactory outcomes as well as better performance contrast with other PVO works and it is more reliable against many steganographic attacks. In non-overlapped-blocks, the size of image block (π), and the set of secret code (p) plays an important role in our suggested method. If p increases and π decreases, then many secrets are inserted into the cover image. Moreover, a pixel will be embedded at most 4 times when p ≥ 1. If we created overlapped-blocks, then a pixel will be embedded at most 7 times. Increasing overlapped-block size improves PSNR in dB of stego image. So, increased overlapped-block size and value of p enhances the secret message as well as the visual quality of stego image. This technique can be implemented as a host signal to other media types such as audio, video, and animated image. It can handle vast quantities of hidden data bits being stored and forwarded. This can also be applied in different contexts, including transform, compress, and random domain. This can also be a valuable guide for professionals in the area of fraud identification and copyright protection.