An efficient reversible data hiding algorithm using two steganographic images

Reversible data hiding (RDH) algorithms are concerned with concealing data within images such that the original image can be fully recovered upon the extraction of hidden data. A substantial interest has grown recently in RDH algorithms that are based on using dual images in order to increase the embedding capacity. In this paper, we propose a RDH algorithm that is based on this concept. Effectively, embedding and extraction of data in the proposed algorithm is performed in three successive phases. In the first phase, four simple rules are used to embed about one bit in each pixel in the two images. On the other hand, the other two phases employ the concept of prediction for embedding secret data bits but without using any complex predictors. Specifically, these phases use one image as the prediction of the other image. Performance evaluation of the proposed algorithm showed its ability to embed around 1.23 bits per pixel with stego image quality above 48dB. Moreover, the proposed algorithm is of low computational complexity and requires no communication of overhead information. A novel dual-image reversible data hiding algorithm is proposed.Three consecutive stages that exploit the similarity between the two images to embed data are used.Significant increase in the embedding capacity with excellent stego image quality is achieved.

[1]  Mohammad Reza Rahimi,et al.  Reversible Data Hiding Scheme Based on Maximum Histogram Gap of Image Blocks , 2012, KSII Trans. Internet Inf. Syst..

[2]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Veysel Aslantas,et al.  DWT-SVD based image watermarking using Particle Swarm Optimizer , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[4]  Khalid A. Darabkh,et al.  Efficient Reversible Data Hiding Using Multiple Predictors , 2016, Comput. J..

[5]  Tung-Shou Chen,et al.  Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism , 2011, J. Vis. Commun. Image Represent..

[6]  Tzu-Chuen Lu,et al.  Dual imaging-based reversible hiding technique using LSB matching , 2015, Signal Process..

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[9]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[10]  Chin-Chen Chang,et al.  Reversible data hiding scheme using two steganographic images , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[11]  Mehdi Fallahpour,et al.  High capacity lossless data hiding based on histogram modification , 2007, IEICE Electron. Express.

[12]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[13]  Ioannis Pitas,et al.  Asymptotically optimal detection for additive watermarking in the DCT and DWT domains , 2003, IEEE Trans. Image Process..

[14]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[15]  Khalid A. Darabkh,et al.  An improved image least significant bit replacement method , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[16]  Iyad F. Jafar,et al.  Reversible data hiding based on histogram shifting of prediction errors using two predictors , 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).

[17]  Chin-Chen Chang,et al.  Hiding secret data in images via predictive coding , 2005, Pattern Recognit..

[18]  Chin-Chen Chang,et al.  A high payload data embedding scheme using dual stego-images with reversibility , 2013, 2013 9th International Conference on Information, Communications & Signal Processing.

[19]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[20]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[21]  Chin-Feng Lee,et al.  Reversible data hiding scheme based on dual stegano-images using orientation combinations , 2011, Telecommunication Systems.

[22]  Chin-Chen Chang,et al.  Information Hiding in Dual Images with Reversibility , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.

[23]  M. Hwang,et al.  (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .

[24]  Khalid A. Darabkh,et al.  An improved reversible data hiding algorithm based on modification of prediction errors , 2014, Digital Image Processing.

[25]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[26]  Chin-Chen Chang,et al.  Reversible data hiding scheme based on exploiting modification direction with two steganographic images , 2014, Multimedia Tools and Applications.

[27]  Khalid A. Darabkh,et al.  A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method , 2015, Inf. Technol. Control..

[28]  Wen Gao,et al.  A variable depth LSB data hiding technique in images , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[29]  Adnan M. Alattar,et al.  Reversible watermark using difference expansion of quads , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[30]  Chin-Chen Chang,et al.  A reversible data hiding scheme based on dual steganographic images , 2009, ICUIMC '09.

[31]  Xinpeng Zhang,et al.  Reversible Data Hiding With Optimal Value Transfer , 2013, IEEE Transactions on Multimedia.

[32]  Jeng-Shyang Pan,et al.  Reversible watermarking based on multiple prediction modes and adaptive watermark embedding , 2013, Multimedia Tools and Applications.