Skip to main content
Log in

Reversible data hiding in dual Stegano-image using an improved center folding strategy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, the dual stego-image reversible data embedding methods have been developed rapidly, e.g., exploiting modification direction, magic matrix, least significant bit matching, and center folding strategy. The kind of method can effectively embed secret data into two stego-images and maintain excellent image quality and enhance the security. In 2015, Lu et al. proposed a center folding strategy that can effectively encode messages as the smaller digits. The encoding procedure reduces the modification level of pixels, thereby maintaining good image quality. However, their strategy does not use the relationship between the adjacent digits to reduce the number of the largest digits. Inspired by joint neighboring coding, we proposed a dynamic encoding strategy to improve the center folding strategy. The encoding strategy can reduce the secret digits and decrease the occurrence frequency of the maximum digits, thereby substantially reducing the modification level of pixels. The advantage makes that the proposed method can achieve a higher PSNR value than previous methods under the same embedding rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In Proceedings of IEEE Region 10 International Conference (TENCON), pp. 1–4

  2. Chang CC, Lu TC, Chang YF, Lee RCT (2007) Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium. International Journal of Innovative Computing, Information and Control 3(5):1145–1160

    Google Scholar 

  3. Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145–152

  4. Chang CC, Lu TC, Horng G, Huang YH, Hsu YM (2013) A high payload data embedding scheme using dual stego-images with reversibility. In Proceedings of Third International Conference on Information, Communications and Signal Processing, pp. 1–5

  5. Chung KL, Huang YH, Chang PC, Mark Liao HY (2010) Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. IEEE Trans Circuits Syst Video Technol 20(11):1643–1647

    Article  Google Scholar 

  6. Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electronics Express 5(20):870–876

    Article  Google Scholar 

  7. Horng G, Huang YH, Chang CC, Liu Y (2014) (k, n)-image reversible data hiding. Journal of Information Hiding and Multimedia Signal Processing 5(2):152–164

    Google Scholar 

  8. Huang YH, Chang CC, Wu CY (2014) A DNA-based data hiding technique with low modification rates. Multimedia Tools and Applications 70(3):1439–1451

    Article  Google Scholar 

  9. Jana B, Giri D, Mondal SK (2016) Dual-image based reversible data hiding scheme using pixel value difference expansion. International Journal of Network Security 18(4):633–642

    Google Scholar 

  10. Lee CF, Chen HL (2012) Adjustable prediction-based reversible data hiding. Digital Signal Process 22(6):941–953

    Article  MathSciNet  Google Scholar 

  11. Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247

    Article  Google Scholar 

  12. Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228–237, 2009

  13. Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83(10):1864–1872

    Article  Google Scholar 

  14. Lu TC, Lu CM, Chang CC (2007) Multimedia security techniques, Taiwan: CHWA

  15. Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89

    Article  Google Scholar 

  16. Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 15:195–213

    Article  Google Scholar 

  17. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  18. Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687–2695

    Article  Google Scholar 

  19. Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  MATH  Google Scholar 

  20. Qin C, Chang CC, Horng G, Huang YH, Chen YC (2015) Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Security and Communication Networks 8(6):899–906

    Article  Google Scholar 

  21. Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. In Proceedings of International Conference on Image Processing 3, 1549–1552

  22. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  23. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  24. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626

    Article  MATH  Google Scholar 

  25. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chang-Han Wu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chi, LP., Wu, CH. & Chang, HP. Reversible data hiding in dual Stegano-image using an improved center folding strategy. Multimed Tools Appl 77, 8785–8803 (2018). https://doi.org/10.1007/s11042-017-4774-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4774-y

Keywords

Navigation