Skip to main content
Log in

Dual encoding approach with sequence folding for reversible data hiding in dual stego images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a dual encoding approach with sequence folding for reversible data hiding in dual stego images. This method initially encodes the secret data by creating two encoding tables that contain index as well as code sequence based on message intensities and the two encoding tables are updated. The code sequence in the second encoding table is folded if the preceding half or succeeding half of the two encoding tables gets matched. The folding is also done if the maximum intensity in the code of two encoding tables lies in the most succeeding end. The same encoding process is repeated for all message intensities. After encoding the message intensities, the encoded indices are embedded on the cover image to obtain the dual stego images. In the data extraction phase, the encoded indices are initially extracted and is decoded by using the dual decoding table. The behavior of the proposed data hiding is evaluated using the metrics such as embedding capacity, embedding rate, PSNR, and SSIM using the standard test images. Experimental verification reveals that the proposed data hiding algorithm shows outstanding performance when compared to the traditional dual stego based data hiding methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. (Archive) CS103 S15 — Picture class. http://bits.usc.edu/cs103-sp15/picture/. Accessed 25 Feb 2020

  2. Bhattacharyya D, Kim TH (2011) Image data hiding technique using discrete Fourier transformation. Commun Comput Inf Sci 151:315–323. https://doi.org/10.1007/978-3-642-20998-7_39

    Article  Google Scholar 

  3. Celik MU, Sharma G, Tekalp AM, Saber E (2002) Reversible data hiding. In Proceedings. International Conference on Image Processing 2:II–II

  4. Chang C-C, Kieu TD, Chou Y-C (2007) Reversible data hiding scheme using two steganographic images. TENCON 2007–2007 IEEE Reg 10 Conf 1–4. https://doi.org/10.1109/TENCON.2007.4483783

  5. Chang CC, Lu TC, Horng G, et al (2013) A high payload data embedding scheme using dual stego-images with reversibility. ICICS 2013 - Conf Guid 9th Int Conf information, Commun Signal Process 1–5. https://doi.org/10.1109/ICICS.2013.6782790

  6. Chi LP, Wu CH, Chang HP (2018) Reversible data hiding in dual Stegano-image using an improved center folding strategy. Multimed Tools Appl 77:8785–8803. https://doi.org/10.1007/s11042-017-4774-y

    Article  Google Scholar 

  7. Emmanuel AUBERT - LCM3B UHP Nancy 1. http://crm2.univ-lorraine.fr/pages_perso/Aubert/FTenglish/TheoIm/theoim.html. Accessed 25 Feb 2020

  8. Fridrich J, Goljan M, Du R (2002) Lossless data embedding for all image formats. In Security and Watermarking of Multimedia Contents IV. International Society for Optics and Photonics 4675:572–583

  9. Hong W, Chen TS, Shiu CW (2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 82:1833–1842. https://doi.org/10.1016/j.jss.2009.05.051

    Article  Google Scholar 

  10. Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Video Technol 19:250–260. https://doi.org/10.1109/TCSVT.2008.2009252

    Article  Google Scholar 

  11. Jung K (2017) Authenticable reversible data hiding scheme with less distortion in dual stego-images. Multimed Tools Appl 77:6225–6241. https://doi.org/10.1007/s11042-017-4533-0

    Article  Google Scholar 

  12. Lee SK, Suh YH, Ho YS (2006) Reversible image authentication based on watermarking. 2006 IEEE Int Conf multimed expo, ICME 2006 - Proc 2006:1321–1324. https://doi.org/10.1109/ICME.2006.262782

  13. Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2:321–330. https://doi.org/10.1109/TIFS.2007.905146

    Article  Google Scholar 

  14. Li Q, Wu Y, Bao F (2010) A reversible data hiding scheme for JPEG images. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 6297 LNCS:653–664. https://doi.org/10.1007/978-3-642-15702-8_60

  15. Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20:3524–3533. https://doi.org/10.1109/TIP.2011.2150233

    Article  MathSciNet  MATH  Google Scholar 

  16. Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22:2181–2191. https://doi.org/10.1109/TIP.2013.2246179

    Article  MathSciNet  MATH  Google Scholar 

  17. Li H, He F, Liang Y, Quan Q (2020) A dividing-based many-objective evolutionary algorithm for large-scale feature selection. Soft Comput 24:6851–6870. https://doi.org/10.1007/s00500-019-04324-5

    Article  Google Scholar 

  18. Lin CC, Shiu PF (2009) DCT-based reversible data hiding scheme. Proc 3rd Int Conf ubiquitous Inf Manag Commun ICUIMC’09 327–335. https://doi.org/10.1145/1516241.1516298

  19. Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 115:195–213. https://doi.org/10.1016/j.sigpro.2015.03.017

    Article  Google Scholar 

  20. Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89. https://doi.org/10.1016/j.sigpro.2014.08.022

    Article  Google Scholar 

  21. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5:187–193

    Article  Google Scholar 

  22. Mobasseri BG, Berger RJ, Marcinak MP, Naikraikar YJ (2010) Data embedding in JPEG bitstream by code mapping. IEEE Trans Image Process 19:958–966. https://doi.org/10.1109/TIP.2009.2035227

    Article  MathSciNet  MATH  Google Scholar 

  23. Nikolaidis A, Pitas I (2003) Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans Image Process 12:563–571. https://doi.org/10.1109/TIP.2003.810586

    Article  Google Scholar 

  24. Barton JM, Barton, JM (1997) Method and apparatus for embedding authentication information within digital data. United States patent US 5,646,997

  25. (No Title). https://www.cs.montana.edu/courses/spring2004/430/lectures/02/lect02.html. Accessed 25 Feb 2020

  26. Qian Z, Zhang X (2012) Lossless data hiding in JPEG bitstream. J Syst Softw 85:309–313. https://doi.org/10.1016/j.jss.2011.08.015

    Article  Google Scholar 

  27. Qin C, Chang C, Hsu T (2014) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74:5861–5872. https://doi.org/10.1007/s11042-014-1894-5

    Article  Google Scholar 

  28. Sachnev V, Kim HJ, Nam J et al (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Video Technol 19:989–999. https://doi.org/10.1109/TCSVT.2009.2020257

    Article  Google Scholar 

  29. Sakai H, Kuribayashi M, Morii M (2008) Adaptive reversible data hiding for JPEG images. 2008 Int Symp Inf theory its Appl ISITA2008 7–10. https://doi.org/10.1109/ISITA.2008.4895529

  30. Shaji C, Sam IS (2019) Reversible Data Hiding based on Horizontal and Vertical Pixel Pair Selection in Dual Stego Images. In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, New Delhi, pp 769–773

  31. Shaji C, Sam IS (2019) A new data encoding based on maximum to minimum histogram in reversible data hiding. Imaging Sci J 0:1–13. https://doi.org/10.1080/13682199.2019.1592892, 67

  32. Shaji C, Sam IS (2020) Two level data encoding approach for reversible data hiding in dual Stego images. Multimed Tools Appl 79:26969–26993. https://doi.org/10.1007/s11042-020-09273-y

    Article  Google Scholar 

  33. Singh G, Goel N (2016) Entropy based image watermarking using discrete wavelet transform and singular value decomposition. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, New Delhi, pp 2700–2704

  34. SIPI Image Database - Misc. http://sipi.usc.edu/database/database.php?volume=misc&image=22#top. Accessed 25 Feb 2020

  35. Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process 7:297–306. https://doi.org/10.1007/s11760-011-0238-4

    Article  Google Scholar 

  36. Test Images. https://homepages.cae.wisc.edu/~ece533/images/. Accessed 25 Feb 2020

  37. Wahed MA, Nyeem H (2018) Efficient LSB substitution for interpolation based reversible data hiding scheme. 20th Int Conf Comput Inf Technol ICCIT 2017 2018–January:1–6. https://doi.org/10.1109/ICCITECHN.2017.8281771

  38. Wang K, Lu ZM, Hu YJ (2013) A high capacity lossless data hiding scheme for JPEG images. J Syst Softw 86:1965–1975. https://doi.org/10.1016/j.jss.2013.03.083

    Article  Google Scholar 

  39. Wang Y, Shen J, Hwang M (2018) A novel dual image-based high payload reversible hiding technique using lsb matching 20:801–804. https://doi.org/10.6633/IJNS.201807

  40. Xuan G, Shi YQ, Ni Z et al (2007) Reversible data hiding for JPEG images based on histogram pairs. Lect Notes Comput Sci 4633:715–727. https://doi.org/10.1007/978-3-540-74260-9_64

    Article  Google Scholar 

  41. Yu H, He F, Pan Y (2020) A scalable region-based level set method using adaptive bilateral filter for noisy image segmentation. Multimed Tools Appl 79:5743–5765. https://doi.org/10.1007/s11042-019-08493-1

    Article  Google Scholar 

  42. Zhang S, He F (2019) DRCDN: learning deep residual convolutional dehazing networks. Vis Comput 36:1797–1808. https://doi.org/10.1007/s00371-019-01774-8

    Article  Google Scholar 

  43. Zhang J, He F, Chen Y (2020) A new haze removal approach for sky/river alike scenes based on external and internal clues. Multimed Tools Appl 79:2085–2107. https://doi.org/10.1007/s11042-019-08399-y

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Shaji.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shaji, C., Sam, I.S. Dual encoding approach with sequence folding for reversible data hiding in dual stego images. Multimed Tools Appl 80, 13595–13614 (2021). https://doi.org/10.1007/s11042-020-10240-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10240-w

Keywords

Navigation