Next Article in Journal
Hybrid Control of Digital Baker Map with Application to Pseudo-Random Number Generator
Next Article in Special Issue
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection
Previous Article in Journal
Generalized Structure Functions and Multifractal Detrended Fluctuation Analysis Applied to Vegetation Index Time Series: An Arid Rangeland Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy

1
Department of Information Management, Chaoyang University of Technology, Taichung 41349, Taiwan
2
Department of Computer Science, Vidyasagar University, Midnapore 721102, India
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(5), 577; https://doi.org/10.3390/e23050577
Submission received: 12 April 2021 / Revised: 27 April 2021 / Accepted: 27 April 2021 / Published: 8 May 2021
(This article belongs to the Special Issue Entropy Based Data Hiding and Its Applications)

Abstract

:
In 2018, Tseng et al. proposed a dual-image reversible embedding method based on the modified Least Significant Bit matching (LSB matching) method. This method improved on the dual-image LSB matching method proposed by Lu et al. In Lu et al.’s scheme, there are seven situations that cannot be restored and need to be modified. Furthermore, the scheme uses two pixels to conceal four secret bits. The maximum modification of each pixel, in Lu et al.’s scheme, is two. To decrease the modification, Tseng et al. use one pixel to embed two secret bits and allow the maximum modification to decrease from two to one such that the image quality can be improved. This study enhances Tseng et al.’s method by re-encoding the modified rule table based on the probability of each hiding combination. The scheme analyzes the frequency occurrence of each combination and sets the lowest modified codes to the highest frequency case to significantly reduce the amount of modification. Experimental results show that better image quality is obtained using our method under the same amount of hiding payload.

1. Introduction

With the rapid development of digital technology nowadays, a large amount of information is transmitted on the Internet. Although it is convenient, it is also, however, insecure. The transmitted data may be stolen by unscrupulous third parties. Consequently, to keep the seed details from being tampered with or viewed, researchers use different information-hiding techniques to conceal and cover the information transmitted over unsecured channels. There are three major requirements for information-hiding methods, as follows [1]:
(1)
Security: This requirement is necessary to protect the information from being detected or cracked by illegitimate third parties.
(2)
Imperceptibility: To improve protection, the image cannot be blurred, deformed, or distorted, and cannot be easily detected by the human eye.
(3)
High Capacity: The more data embedding, the higher the distortion that occurs. Making good use of every hidden space, and increasing the capacity are also important.
Information-hiding technologies can be classified into “Reversible Data Hiding (RDH)” and “Non-Reversible Data Hiding (NRDH).” Most of the early information-hiding technologies are NRDH, meaning that after extracting the confidential information, there is no way to restore it to the original image, such as with the Least Significant Bit Replacement (LSB), LSB matching, modulus methods, and so on. However, scholars have successively proposed various RDH techniques to fix this problem. Nowadays, researchers are working hard on increasing the hiding capacity and improving the visual quality, which is also the standard for measuring the quality of the suggested method [2,3].
The RDH schemes focus on the image quality and whether it can be restored in the future, so the RDH method usually uses a lower amount of secret information. Increasing the capacity of RDH storage has become one of the challenges that have been paid much attention to in recent years. Common RDH methods include the Difference Expansion, Histogram Shifting, Compression Image and Dual-Images (DI) techniques, and so on [4,5,6,7,8,9,10,11,12,13].
Some RDH methods are essentially reversible, while some become reversible after being improved by certain techniques [14,15,16,17]. Among them, the LSB matching method, which was proposed by Mielikainen in 2006, uses the parity of the Least Significant Bit value of pixels to hide the confidential information [18,19,20,21,22,23]. Although this method is a non-reversible method, Lu et al. improved it to become reversible in 2015 [24]. They found that while using LSB matching, there are seven cases of modifications that cannot be recovered successfully, resulting in the method being non-reversible. To fix this problem, Lu et al. used a mapping table, which instructs the corresponding modifying rules to make the LSB matching method become a reversible technique when they encounter the non-reversible seven cases. After this method was proposed, many investigators began to study how improvements could increase the efficiency of this method. Tseng et al.’s scheme is one of these methods, which proposes a single-pixel hiding method that effectively improves the quality of stego-images [25]. Lu et al.’s method uses two pixels as a pair for dual-image hiding. That is, four pixels are used to hide four secret bits in each hiding process. Tseng et al.’s method, on the other hand, uses only one pixel of both images at a time. In other words, only two pixels of the two images are used at a time to embed two secret bits. Hence, the number of pixel modifications is reduced.
This investigation found that the hiding performance of Tseng et al.’s scheme is determined by the frequency of the modification. If one can control the modification times, then the image quality is controllable. Hence, this study analyzes the hidden rules of Tseng et al.’s scheme. The proposed scheme calculates in advance the number of occurrences of all hidden rules and the amount of modification to re-encode the confidential information for reducing the image distortion. Consequently, the proposed method achieves the result of improving stego-image visual quality.

2. Literature Discussion

In 2006, Mielikainen proposed an LSB matching method to embed two secret bits into two pixels. In their scheme, only one pixel will be modified in the embedding process such that effectively reduce the image distortion. However, the scheme is non-reversible. In 2015, Lu et al. extended the LSB matching method to become a reversible hiding scheme using dual-image technique. In Lu et al.’s scheme, four secret bits are concealed into two pixel-pairs in two copy images, respectively. After that, Wang et al. enhanced Lu et al.’s scheme to reuse the second pixel of the pixel pair for concealing one more secret bit. Different from Lu et al. and Wang et al.’s scheme, Tseng et al. use one pixel instead of two pixels in the pixel pair to embed one secret bit. More details about the related works are shown below.

2.1. Least Significant Bit (LSB) Matching Method

The LSB matching method, which was proposed by Mielikainen in 2006, improved on the LSB replacement method by Chen et al. in 2004. The image quality of Chen et al.’s scheme is poor when the amount of confidential information increases. Therefore, Mielikainen proposed the LSB matching method to improve the image quality of Chen et al.’s scheme [22]. The hiding flowchart of LSB replacement is shown in Figure 1.
In their scheme, a cover image is divided into several 1 × 2 non-repetitive blocks, and A and B are represented as two pixels for each block. The confidential information to be hidden in each group is m 1 and m 2 . The scheme follows the tree flow diagram, as shown in Figure 1, to find the proper modify rule. The LSB of A is compared with m 1 , and then the value of F function is compared with m 2 to determine the final modify rule. The F function is shown as follows:
F ( A ,   B ) = L S B ( A 2 + B )
Four conditions of the final modify rule are shown, as follows:
  • Case 1: When L S B ( A ) = m 1 and F ( A ,   B ) = m 2 , the pixel pair A and B does not need modification.
  • Case 2: When L S B ( A ) = m 1 and F ( A ,   B ) m 2 , the pixel A does not change, and B = B + 1 or B = B 1 .
  • Case 3: When L S B ( A ) m 1 and F ( A 1 ,   B ) = m 2 , the pixel A = A 1 , and B does not change.
  • Case 4: When L S B ( A ) m 1 and F ( A 1 ,   B ) m 2 , the pixel A = A + 1 , and B does not change.
After hiding each group of pixel pairs and confidential information in sequence, a camouflage image can be obtained.
When the receiver receives the camouflage image, the confidential information extraction process can be executed. The extraction formula is shown, as follows:
m 1 = L S B ( A )
m 2 = L S B ( A 2 + B )
Finally, the hiding and extracting processes are done.
Let us assume the pixel pairs to be A = 128 , B = 130 and the confidential information to be s = ( 01 ) 2 . First, determine whether L S B ( 128 ) is the same as the confidential message m 1 = 0 . One can observe that L S B ( 128 ) does equal 0. Therefore, the scheme uses the L S B ( 128 ,   130 ) function to determine whether LSB = L S B ( 128 2 + 130 ) is the same as m 2 = 1 . According to the hiding flowchart, the result is that L S B ( 128 2 + 130 ) 1 . Hence, the final modify rule is Case 2, where the pixel A does not change, and B = B + 1 . Finally, these results are A = 128 and B = 131 . The above numerical example shows the complete hiding process, and subsequently, when the recipient is restoring, the confidential information can be restored through Equations (2) and (3), m 1 = L S B ( 128 ) = 0 , m 2 = L S B ( 128 2 + 131 ) = 1 .

2.2. Dual-Images Technique Based on the LSB Matching Method

Lu et al. proposed a dual-image LSB matching method in 2015 [24]. Lu et al. use a cover image to generate two copy images as the cover medium, instead of a single medium in LSB matching. Every two pixels in each copied image can hide two secret bits, or in other words, every two pixels can carry four secret bits in two copy images. This method can restore the original cover image after the extraction and recovery processes.
In the embedding procedure, the scheme copies the cover image into two identical images, then divides the original image into 1 × 2 non-repetitive blocks. The scheme sets the two pixels in the pixel group as A and B . Each group can contain four confidential messages s = { m 1   m 2   m 3   m 4   } . The scheme uses the LSB matching method to hide m 1   ,   m 2 into pixels A and B of the first camouflage image and m 3   ,   m 4   are hidden in pixels A and B of the second camouflage image. After completing the concealment, it is necessary to confirm whether the camouflage image can be restored to the original image through the averaging method. The formula of the averaging method is as follows:
A r = A + A 2 ,   B r = B + B 2
A r and B r represent the original value that was restored by the averaging method. When A r = A and B r = B , it means that the pixel value of the camouflage image can be restored successfully without any modification. Otherwise, if A r A or B r B , it means that the camouflage pixels are not able to be restored correctly. Therefore, the pixel values require a modification according to the seven modification rules designed by Lu et al. The seven modification rules are shown in Table 1 and the complete embedding flow chart is shown in Figure 2. In the table, T A and T B mean the temp stego-results of A and B in the first camouflage image. T A and T B mean the temp stego-results in the second camouflage image. After adjustment, the final camouflage pixels are modified to A ,   B ,   A and B .
In the extraction procedure, the scheme uses the same formula as LSB matching methods, like Equations (2) and (3), to extract the secret information. The original image can be recovered by using the averaging method in Equation (4). Consider the original pixels A = 37 and B = 33 as an example. First, the scheme duplicates the image into two images of identical size. The pixel pairs are ( A 1 , B 1 ) = ( A 2 , B 2 ) = ( 37 , 33 ) and set the secret data to s = ( 0000 ) 2 . According to the LSB matching method L S B ( A 1 ) = L S B ( 37 ) = 1 , and because L S B ( 37 ) m 1 = 0 , it is replaced by 37 1 = 36 . The scheme puts 36 and B 1 = 33 into F function to obtain F ( 36 , 33 ) = L S B ( 51 ) = 1 . The value of the F function is not equal to m 2 = 0 , and the result is Case 4, which is T A = A 1 + 1 and T B = B 1 .
The pixel pair in the second image ( A 2 , B 2 ) hides the secret data s = ( 00 ) 2 . After calculation, we obtain the same result, Case 4, which is T A = A 2 + 1 and T B = B 2 . Second, the scheme checks whether the camouflage pixels can be recovered or not by referring to the seven modification rules. Here, we can see that Rule 7 of the seven modification rules confirms this, hence, the final camouflage pixels will be modified into A = 37 1 = 36 ,   A = 37 1 = 36 , B = 33 1 = 32 , A = 37 + 1 = 38 and B = 33 + 2 = 35 .
The extracting procedure can be implemented by using Equations (2) and (3). The scheme calculates the message m 1 = L S B ( 36 ) = 0 and m 2 = L S B ( 36 2 + 32 ) = L S B ( 50 ) = 0 from the first pixel pair (36, 32). The messages m 3 = L S B ( 38 ) = 0 and m 4 = L S B ( 38 2 + 35 ) = L S B ( 54 ) = 0 are extracted from the second pixel pair (38, 35). The complete confidential message is s = ( 0000 ) 2 .

2.3. Improved Dual Image-Based RDH Using LSB Matching

In 2017, Wang et al. proposed an improved method of Lu et al.’s dual-image scheme [26]. The embedding process is roughly the same as that of Lu et al.’s scheme, but the difference is that after hiding two pixels, the scheme will then determine whether the second pixel can be used to conceal once again. Wang et al. proposed a new modified rule table to fix the recovery problem. The diagram of their scheme is shown in Figure 3. The formula to check whether the second pixel could be used once again is as follows:
| B B | = = 0
In Equation (5), B represents the second pixel of the first camouflage pixel pair, and B represents the second pixel of the second camouflage pixel pair. The equation means that if the second pixels in both first and the second camouflage images are the same, then the second pixel can be used once again.
The scheme takes two pixels as a pair and uses LSB matching to embed secret data. The detailed process is described as follows:
  • Duplicate the original image into two identical images.
  • Use LSB matching to embed secret data m 1 m 2 into the first image to generate { T A , T B } and secret data m 3 m 4 into the second image to generate { T A , T B } .
  • Look up Wang et al.’s modification rule table, as shown in Table 2, and modify the pixels that cannot be recovered properly. There are 11 cases in the modified rule table.
  • Use Equation (5) to check whether the second pixel can possibly be used to embed overlapping. If Equation (5) is satisfied, then the scheme uses the second pixel of the pixel pair as the first pixel to be hidden next time. Otherwise, if Equation (5) is not satisfied, the scheme skips the second pixel and finds a new pixel pair to embed the next occurrence of secret data.
  • Repeat Steps (2) to (4) until all secret data are embedded into two camouflage images.
The extracting procedure can be implemented by using Equation (6) to extract the first secret data and using Equation (7) to extract the second secret data. Similarly, the scheme uses Equations (8) and (9) to extract the third and fourth secret data. In the extracting procedure, the scheme needs to use Equation (5) to check whether the next pixel pair is overlapping or not. If the value of | B B | equals 0 or lower than 3, then the scheme uses the second pixel to perform the next extraction. Otherwise, the scheme uses the new pixel pair to extract secret data. Finally, Equation (10) is used to recover to the original pixel.
m 1 = L S B ( A )
m 2 = L S B ( A 2 + B )
m 3 = L S B ( A )
m 4 = L S B ( A 2 + B )
A = A + A 2

2.4. Tseng’s Dual Image-Based RDH on the Modified LSB Matching Method

In Lu et al.’s method, the seven modified rules are implemented to fix the cases, which are not recoverable to recover correctly [25]. In the modified rules, the greatest distortion made by each pixel is 2, which might be larger than the one produced by the regular LSB matching method. In 2019, Tseng et al. tackled this issue by changing the LSB matching embedding process. Instead of using two neighboring pixels, Tseng et al. used one pixel to make a pixel pair for hiding data by implementing the modified LSB matching. The camouflage pixels generated by modified LSB matching can be recovered correctly using the averaging method without any adjustment. Relying on these changes, Tseng et al.’s method can improve the image quality and achieve retrieval without using the rule table for modification. The embedding procedure is shown in Figure 4.
There are also four cases of modifications in the modified LSB matching, which are like the original LSB matching, with only Case 3 being different. This change is to ensure the recovery procedure can be executed successfully. Four conditions of the final modify rule by Tseng et al. are shown, as follows:
  • Case 1: When L S B ( A ) = m 1 and F ( A , A ) = m 2 , the pixel pair A and A does not need modification.
  • Case 2: When L S B ( A ) = m 1 and F ( A , A ) m 2 , the pixel A = A , and A = A + 1 .
  • Case 3: When L S B ( A ) m 1 and F ( A 1 , A ) = m 2 , the pixel A = A + 1 , and A = A 1 .
  • Case 4: When L S B ( A ) m 1 and F ( A 1 , A ) m 2 , the pixel A = A + 1 , and A = A .

3. Research Methods

Tseng et al.’s scheme is efficient. In their method, the maximum modification is ± 1 according to the adjustment rules of LSB matching. The image quality of Tseng et al.’s scheme is very good.
In Tseng et al.’s scheme, each pixel depending on the secret message there might have several different cases. For an even pixel, its corresponding F function value might be 0 or 1. Each F function value has four different hiding cases 00, 01, 10, and 11. An odd pixel also has the same situation. Therefore, there are 2 (even or odd pixel) × 2 (F value 0 or 1) × 4 (secret messages 00, 01, 10, 11) = 16 different hiding cases.
If we could set up the most frequent case to have the lowest modified values, then the image distortion could be further reduced, such that the image quality could be improved.
Hence, the proposal tries to minimize the number of cases when the modified pixel values differ by 2. It is done by redefining the four maps above so that the worst case is used a minimal number of times. The new maps should be transferred to the receiver additionally to the stego-images. This study analysis and these statistics utilize the appearance rules of Tseng et al.’s scheme to adjust the modification rule table. The diagram of the proposed scheme is shown in Figure 5.

3.1. Preprocessing Procedure

By analyzing Tseng et al.’s scheme, we can find that a different parity of the pixel will cause different embedding results and will use different matching rules. In other words, the odd or even pixel value will affect its embedding orientation. For example, if A is an even number, then F ( A ,   A ) is the same as F ( A + 1 ,   A ) , and it has eight different possible results. On the other hand, if A is an odd number, the results of F ( A ,   A ) are opposite of F ( A + 1 ,   A ) , and it also has eight different possible results. For example, suppose that A = 12 is an even number, the value of F ( A ,   A ) = F ( 12 ,   12 ) = L S B ( 12 2 + 12 ) = 0 is equal to F ( A + 1 ,   A ) = F ( 13 ,   12 ) = L S B ( 13 2 + 12 ) = 0 . On the contrary, suppose that A = 11 is an odd number, the value of F ( A ,   A ) = L S B ( 11 2 + 11 ) = 0 is different from F ( A + 1 ,   A ) = F ( 12 ,   11 ) = L S B ( 12 2 + 11 ) = 1 . Therefore, we can ignore the modification of F ( A + 1 ,   A ) and just look at the part of F ( A ,   A ) . The analysis of F ( A ,   A ) is shown in Table 3.
In the first part, if A is an even number, then there are two different cases of F ( A ,   A ) for embedding the secret message, where F ( A ,   A ) = 0 or F ( A ,   A ) = 1 . Furthermore, for each case of F ( A ,   A ) there are four different embedding situations with m 1 and m 2 . Therefore, there are eight different cases applicable to an even number. For example, suppose that A = 12 , then L S B ( A ) = L S B ( 12 ) = 0 and the value of F ( A ,   A ) = F ( 12 ,   12 ) = L S B ( 12 2 + 12 ) = 0 . If m 1 = 1 and m 2 = 1 , then A = A + 1 = 13 and A = A 1 = 11 . The image distortion made by this case is δ = ( A A ) 2 + ( A A ) 2 = ( 13 12 ) 2 + ( 11 12 ) 2 = 2 . There are also eight different cases for an odd number. For example, suppose that A = 9 , then L S B ( A ) = L S B ( 9 ) = 1 and the value of F ( A ,   A ) = F ( 9 ,   9 ) = L S B ( 9 2 + 9 ) = 1 . If m 1 = 1 and m 2 = 0 , then A = A = 9 and A = A + 1 = 10 . The image distortion made by this case is δ = ( A A ) 2 + ( A A ) 2 = ( 9 9 ) 2 + ( 9 10 ) 2 = 1 .
For the even number with L S B ( A ) and F ( A ,   A ) = 0 , the distortions for the message bits ( m 1 , m 2 ) with (0,0), (0,1), (1,0), and (1,1) are 0, 1, 1, and 2, respectively. The scheme ranks the four cases according to their corresponding distortion value. The column “Ordering ( ρ )” in Table 3 shows the ordering results. The maximum distortion δ = 2 is made by the cases with ρ = 3 . In other words, if the occurrence frequency of the cases with ρ = 3 is large then the image quality becomes worse.
Before the embedding procedure, the proposed scheme analyzes the occurrence frequency of every combination between the cover image and the secret message, for generating a re-encoding table. In the analysis processing, a cover pixel A is duplicated to generate two temp pixels for concealing two message bits m 1 and m 2 . In Table 4, the symbol γ is the frequency of the combination, δ is the distortion made by the modification, ρ is the original order sorting by δ , and θ is the total distortion computed by θ = γ × δ . The scheme re-orders the combination according to γ in a decreasing order to get the new order ρ ^ of each combination.
In Table 4, γ F ( A ,   A ) L S B ( A ) ( t ) means the frequency of the combination with L S B ( A ) and F ( A ,   A ) in the t th case, where 0 t 3 . For example, γ 0 0 ( 3 ) is the frequency for an even number, which is L S B ( A ) = 0 and F ( A ,   A ) = 0 in the case where t = 3 , which results in m 1 = 1 and m 2 = 1 . δ F ( A ,   A ) L S B ( A ) ( t ) is the distortion computed by ( A A ) 2 + ( A A ) 2 with L S B ( A ) and F ( A ,   A ) in the t th case. ρ F ( A ,   A ) L S B ( A ) ( t ) is the ranking of the combination that is sorted by δ F ( A ,   A ) L S B ( A ) ( t ) in decreasing order. The scheme re-ranks the combination to get the new order ρ ^ F ( A ,   A ) L S B ( A ) ( t ) by sorting γ F ( A ,   A ) L S B ( A ) ( t ) in decreasing order.
An example is shown in Table 5. In the table, the occurrence frequency of the even pixel that conceals ( m 1 ,   m 2 ) = ( 1 ,   0 ) is γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 135 . The distortion made by the modification rule, which is shown in Table 3, is δ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = ( + 1 ) 2 + ( 0 ) 2 = 1 . There are 135 pixels, which have the same attributes. Hence, the total number of the distortion is θ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) × δ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 135 × 1 = 135 . Because γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 135 γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 0 ) = 50 γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 3 ) = 45 γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 1 ) = 40 , the order of the combination, with L S B ( A ) = 0 and F ( A ,   A ) = 0 , becomes ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( t ) = { 1 ,   3 ,   0 ,   2 } . The case t = 2 is the highest frequency case, hence, the new order of the combination is the smallest value, where ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 0 . The first case is the second frequency case, so the new order is ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 0 ) = 1 .
The mapping of ρ and ρ ^ of the re-encoding table is used in the embedding and extraction processes.

3.2. Embedding Process

The proposed scheme uses one cover pixel A to embed two message bits m 1 , m 2 in each embedding procedure. To reduce the total amount of distortion, the highest frequency combination is assigned the rule, which has the least distortion. Hence, the scheme modifies the pixel by using the altered rules in Table 6. Let L A F ( A ,   A ) L S B ( A ) ( ρ ^ ) be the first rule used to modify the first camouflage pixel A , and L A F ( A ,   A ) L S B ( A ) ( ρ ^ ) be the second rule to modify the second camouflage pixel A . The symbol ρ ^ is the new order of the combination.
The scheme uses A to compute L S B ( A ) and F ( A ,   A ) along with m 1 and m 2 to map the re-encoding table for obtaining the new order ρ ^ F ( A ,   A ) L S B ( A ) ( t ) . The alter rules are L A F ( A ,   A ) L S B ( A ) ( ε ) and L A F ( A ,   A ) L S B ( A ) ( ε ) , where ε = ρ ^ F ( A ,   A ) L S B ( A ) ( t ) . For example, if we assume that the pixel is even, then A = 14 , L S B ( A ) = 0 , and F ( A ,   A ) = 1 . The alter rules for ε being equal to 0, 1, 2, and 3 are ( L A F ( A ,   A ) = 1 L S B ( A ) = 0 ( ε ) , L A F ( A ,   A ) = 1 L S B ( A ) = 0 ( ε )   ) = ( + 0 , + 0 ) , ( + 0 , + 1 ) ,   ( + 1 , + 0 ) ,   and   ( 1 , + 1 ) , respectively.
For the other example, let us assume that an odd pixel is A = 15 , L S B ( A ) = 1 and F ( A ,   A ) = 0 . The alter rules then are (+0, +0), (+1, +0,), (+0, +1), and ( 1 , +1), respectively.
Following the same example shown above, the new order of the even pixel that conceals ( m 1 ,   m 2 ) = ( 1 ,   0 ) is ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 0 . Because ε = ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 0 the altered rule is ( L A F ( A ,   A ) = 0 L S B ( A ) = 0 ( 0 ) , L A F ( A ,   A ) = 0 L S B ( A ) = 0 ( 0 )   ) = ( + 0 , + 0 ) . The new distortion is δ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = ( 0 ) 2 + ( 0 ) 2 = 0 . The total number of distortions becomes θ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = γ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) × δ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 135 × 0 = 0 . The image distortion is reduced from 135 to 0. The total amount of the distortion, using the original modification rules table, which is shown in Table 5, is 1095. On the other hand, the total amount, using the new alter rules, is 715. Hence, the proposed scheme indeed effectively reduces image distortion.
The detailed process of the proposed scheme is described, as follows:
  • Preprocessing:
    • Set X to be the original image and s to be the secret message.
    • Use two secret bits m 1 and m 2 of s and the corresponding pixel A of X to count the occurrence frequency.
    • Compute L S B ( A ) and F ( A ,   A ) and t = m 1 × 2 + m 2 .
    • Calculate the frequency by γ F ( A ,   A ) L S B ( A ) ( t ) = γ F ( A ,   A ) L S B ( A ) ( t ) + 1 .
    • Map the embedding rule table, which is shown in Table 4, to find the corresponding modification rule.
    • Calculate the distortion δ F ( A ,   A ) L S B ( A ) ( t ) = ( A A ) 2 + ( A A ) 2 .
    • Repeat (B)–(F) until all pixels have been processed.
    • Rank the combinations by δ F ( A ,   A ) L S B ( A ) ( t ) in increasing order to obtain ρ F ( A ,   A ) L S B ( A ) ( t ) .
    • Rank the combinations by γ F ( A ,   A ) L S B ( A ) ( t ) in decreasing order to obtain ρ ^ F ( A ,   A ) L S B ( A ) ( t ) .
  • Embedding Process:
    • Rescan the image X and re-start from the first bit of s.
    • Use two secret bits m 1 and m 2 of s and the corresponding pixel A of X to compute L S B ( A ) , F ( A ,   A ) and t = m 1 × 2 + m 2 .
    • Use the values L S B ( A ) , F ( A ,   A ) and t to find the corresponding order ρ ^ F ( A ,   A ) L S B ( A ) ( t ) .
    • Set ε = ρ ^ F ( A ,   A ) L S B ( A ) ( t ) .
    • Find the rule ( L A F ( A ,   A ) L S B ( A ) ( ε ) , L A F ( A ,   A ) L S B ( A ) ( ε )   ) from Table 6 to compute A and A .
    • Repeat the steps (B)–(E) until all messages are embedded into the image.
Figure 6 shows an embedding example. The original image is X = { 44 , 45 , 37 , , 5 } . The first pixel is 44. Suppose that the secret data is s = ( 10 ) 2 . The scheme calculates the LSB function and F function to get L S B ( 44 ) = 0 and F ( 44 , 44 ) = L S B ( 44 2 + 44 ) = 0 . Suppose that the final re-encoding table is shown in Table 6. The new code of the combination with L S B ( A ) = 0 , and F ( A ,   A ) = 0 and t = m 1 × 2 + m 2 = 2 is ε = ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 0 . The altered rules of ε = 0 are ( L A F ( A ,   A ) = 0 L S B ( A ) = 0 ( 0 ) , L A F ( A ,   A ) = 0 L S B ( A ) = 0 ( 0 )   ) = ( + 0 , + 0 ) . Therefore, the stego-pixels are A = 44 + 0 = 44 and A = 44 + 0 = 44 .
The next pixel is 45, if the confidential message is s = ( 11 ) 2 . The function values are L S B ( 45 ) = 1 , and F ( 45 , 45 ) = 1 . The new code of the combination with L S B ( A ) = 1 , F ( A , A ) = 1 and t = m 1 × 2 + m 2 = 3 is ρ ^ F ( A ,   A ) = 1 L S B ( A ) = 1 ( 3 ) = 2 . The alter rule of ε = ρ ^ F ( A ,   A ) = 1 L S B ( A ) = 1 ( 3 ) = 2 is ( L A F ( A ,   A ) = 1 L S B ( A ) = 1 ( 2 ) , L A F ( A ,   A ) = 1 L S B ( A ) = 1 ( 2 )   ) = ( + 0 , + 1 ) . The stego-pixels are A = 45 + 0 = 45 and A = 45 + 1 = 46 .
The two camouflage images along with the re-encoding table are sent to the receiver for further extracting and recovering.

3.3. Information Extraction and Image Restoration Phase

In this phase, the receiver starts the procedure after having received two camouflage images and the re-encoding table. This method for information extraction is like Tseng et al.’s scheme. The original pixel value A is restored by calculating the floor average of two camouflage pixels A and A .
A = A + A 2
The information extraction procedure can be implemented after recovering A because the scheme needs the original pixel value to do the calculation for some cases.
First, the scheme extracts the temp messages by using Equations (12) and (13).
m ^ 1 = L S B ( A )
m ^ 2 = { L S B ( A 2 + A ) , i f   | A A | = 2 , L S B ( A 2 + A ) , o t h e r w i s e .
The messages obtained from Equations (12) and (13) are not the original messages. Hence, the scheme uses the symbols m ^ 1 and m ^ 2 to represent the temp messages. The formula for extracting m ^ 1 is obtained by calculating the LSB of the pixel value of the first camouflage image. There are two situations for extracting m ^ 2 . If the distance between two camouflage pixels A and A is equal to 2, then the embedding rule used in the pixel is ( A = A 1 and A = A + 1 ) . The extracted message might be wrong when the extraction equation is equal to L S B ( A / 2 + A ) . Hence, the equation is changed to L S B ( A / 2 + A ) .
The order of the combination is recovered by the following equations.
ρ = m ^ 1 × 2 + m ^ 2
The scheme uses ρ to map the corresponding new order ρ ^ from the re-encoding table. The corresponding messages are extracted by mapping ρ ^ to m 1 and m 2 . For example, suppose that A = 44 , m 1 = 0 , and m 2 = 1 . The function values are L S B ( 44 ) = 0 and F ( 44 , 44 ) = 0 . The new code of the combination with L S B ( 44 ) = 0 and F ( 44 , 44 ) = 0 and t = m 1 × 2 + m 2 = 1 is ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 1 ) = 3 . The alter rule of ε = ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 1 ) = 3 is ( L A F ( A ,   A ) = 0 L S B ( A ) = 0 ( 3 ) , L A F ( A ,   A ) = 0 L S B ( A ) = 0 ( 3 )   ) = ( 1 , + 1 ) . The stego-pixels are A = 44 1 = 43 and A = 44 + 1 = 45 .
In the extraction phase, the original pixel is recovered by A = ( A + A ) / 2 = ( 43 + 45 ) / 2 = 44 . The first temp secret bit is computed by m ^ 1 = L S B ( A ) = L S B ( 43 ) = 1 . Because | A A | = | 43 45 | = 2 , the second bit is calculated by m ^ 2 = L S B ( A / 2 + A ) = L S B ( 44 / 2 + 45 ) = 1 . The order of the combination is ρ = m ^ 1 × 2 + m ^ 2 = 1 × 2 + 1 = 3 . The scheme uses L S B ( A ) = 0 and F ( A , A ) = 0 and ρ = 3 to map the corresponding new order ρ ^ from the re-encoding table, which is shown in Table 6. The corresponding messages are extracted by mapping ρ ^ to its corresponding message m 1 = 0 and m 2 = 1 . The diagram of the mapping is shown in Figure 7.
Similarly, let us take Figure 6 as an example. The first pixel is recovered by A = ( 44 + 44 ) / 2 = 44 . The temp messages are m ^ 1 = L S B ( 44 ) = 0 and m ^ 2 = L S B ( 44 / 2 + 44 ) = 0 . The order value is ρ = m ^ 1 × 2 + m ^ 2 = 0 . The corresponding new order ρ ^ of the combination with L S B ( 44 ) = 0 and F ( A , A ) = 0 and ρ = 0 is ρ ^ F ( A ,   A ) = 0 L S B ( A ) = 0 ( 2 ) = 0 , where t = 2 . The mapping messages are m 1 = 1 and m 2 = 0 . The diagram of the mapping is shown in Figure 8.
The second pixel is A = 45 + 46 2 = 45 . The temp messages are m ^ 1 = L S B ( 45 ) = 1 and m ^ 2 = L S B ( 45 / 2 + 46 ) = 0 . The order value is ρ = 1 × 2 + 0 = 2 . The corresponding new order ρ ^ of the combination with L S B ( 45 ) = 1 and F ( 45 , 45 ) = 1 and ρ = 2 is ρ ^ F ( A ,   A ) = 1 L S B ( A ) = 1 ( t ) = 2 , where t = 3 . The mapping messages are m 1 = 1 and m 2 = 1 . The final confidential message is S = ( 1011 ) 2 . The diagram of the embedding example is shown in Figure 9.

3.4. Overflow and Underflow Problem

The method proposed in this study is an improvement on the method suggested by Tseng et al.’s scheme. Therefore, the same overflow and underflow problems will exist. To solve this problem and avoid these issues, we could apply the same rules as the method proposed by Tseng et al. If the original pixel value is equal to 0 or 255, then the pixel is non-embeddable and cannot be used to conceal the message. For the non-embeddable pixel, the value will remain unchanged. In the extraction process, if both camouflage pixels are equal to 0 or 255, then it means there is no secret data hidden in it. Even if only one stego-pixel value is equal to 0 or 255 it is evident that it still has the secret message concealed in it.

4. Experimental Results and Discussions

This research employed Matlab (version R2016b) as the test environment, and used six grayscale images (512 × 512 in size) to conduct experiments in order to verify whether the research method can effectively improve the image quality. The following figures show the six grayscale images used in the experiment. The test images are Lena, Mandrill, Pepper, Airplane, Lake, and Tiffany. The images are shown in Figure 10.
In the experiment, the Peak Signal-to-Noise Ratio (PSNR) is used to quantify the image quality. PSNR is usually expressed as a logarithmic quantity using the decibel (dB) scale. The following is the definition of PSNR:
P S N R = 10 × ( 255 2 M S E )   ( d B )
The MSE of the equation is the mean square error, which represents the square root of the difference between the original image and the camouflage image. Therefore, the smaller the MSE value, the better the calculated image quality. The MSE formula is as follows:
M S E = 1 h × w i = 1 h j = 1 w ( x i , j x i , j ) 2
h and w, respectively, represent the length and width of the image, x i , j represents the pixels of the original image, and x i , j represents the pixels of the camouflage image. Dual-image technology is implemented in this paper. Hence, we used the average of the two camouflage-image PSNR values in our comparison with other methods.
The hiding payload is computed by:
bpp = T B 2 × h × w .
where TB is the total number of secret message bits, which are embedded into the cover image (and “bpp” means bits per pixel). Because the proposed scheme is a dual-image based scheme, the total number of pixels is 2 × h × w.
This study compares the proposed scheme with Lee et al.’s scheme, schemes Lee2009 and Lee2013 [6,7], Qin and Chang et al.’s scheme [3], the center folding scheme (CenterFolding) proposed by Lu et al. [9], LSB-M proposed by Lu et al. [24], and LSB-MA proposed by Tseng et al. [25] The proposed scheme is indicated with LSB-MA-ordering. Figure 11, Figure 12 and Figure 13 show the experimental results.
In the first experiment, the scheme randomly generates the secret message and conceals it into the test image. Figure 11 shows the results of concealing the random bits into Lena. The hiding payloads of Chang2013 and Center Folding are higher than that of the others, however, the PSNR values of Chang2013 and CenterFolding are worse than that of the others. The LSB matching based schemes can achieve higher image quality. Among them, the hiding payload of Lee2009 is the least. The image quality of LSB-MA-ordering is the highest.
From Figure 11 and Figure 12 we can observe that the proposed scheme can get the highest image quality regardless of whether the image is complex or smooth. The experimental results of the other images have very similar curve to Lena. Hence, this study only shows the results of two images: Lena and Mandrill.
In the following experiment, this study used an image as the secret message to be concealed into the test image. Figure 13 shows the experimental results. The image quality of the proposed scheme is still the highest among the comparison schemes.
To test the efficient of the proposed scheme, this study statistics the probability of different pixels with different secret message by using three different types of secret messages. The first secret message was generated by the random number generator (RNG), the second and the third message were the fixed images ‘Tiffany’ and ‘CYUT Bird’, which are shown in Figure 14. The statistic results are shown in Table 7. There are 16 different combinations composed by L S B ( A ) , F ( A ,   A ) , m 1 and m 2 . The column ‘Count’ is the total number of the occurrence of the combination, ‘%’ is the percentage of the combination, L A and L A are the operator to compute the stego-pixels A and A , ‘ δ ’ is the distortion made by L A and L A , and ‘TD’ is the total number of distortion made by the combination. ‘Total Distortion’ in the end of the table is the total distance made by the secret image.
Form the table we can see that the count of each combination of the random number generate is almost the same. The average percentage is 6.25% and the standard deviation is 0.00049. The total number of the distortion made by the random number generate is 263,040. The count of the secret image ‘Tiffany’ is different from that of the RNG. The average percentage to embed m 1 = 1 and m 2 = 1 is 9.01%. The standard deviation is 0.02209. The total distortion of the secret image ‘Tiffany’ is 208,143, which is smaller than that of the RNG.
The count of each combination of the secret image ‘CYUT Bird’ is very different from the other two secret messages. Because the secret image has a lot of white pixels, which most significant bits start with ‘11’ in the binary system. Hence, the probability of the pixel concealed with m 1 = 1 and m 2 = 1 is very high. The average percentage to embed m 1 = 1 and m 2 = 1 is 15.95%. The standard deviation is 0.05608. The total distortion of the secret image is 121,120, which is smallest of the three secret messages. Therefore, the image quality can be greatly improved especially for the secret image, which is not uniform.
Furthermore, although the proposed scheme needs to transmit the mapping table to the receiver for extracting the secret message and recovering the original image, the necessary extra information that needed to be transmitted is ρ ^ and ρ of the mapping table. The scheme transforms the numbers of ρ ^ into the binary system to form a binary string. There are 16 numbers of ρ ^ . The maximum value of ρ ^ is 3. Hence, the scheme only uses two bits to encode the value. After encoded the total length of the binary string of ρ ^ is 16 × 2 = 32 bits.
The values of ρ are also encoded to a binary string. The length of the string is also 16 × 2 = 32 . Two binary strings are concatenated together to transmit to the receiver.
The receiver picks two bits up from the binary strings each time and transforms the bits into a decimal number to fill into the mapping table. If the value of ρ ^ is equal to 0, then L A = 0 and L A = 0 . If the value of ρ ^ is equal to 1, then L A = 0 and L A = 1 . If the value of ρ ^ is equal to 2, then L A = 1 and L A = 0 . If the value of ρ ^ is equal to 3 then L A = 1 and L A = 1 .
Therefore, the total number of the mapping table sent from the sender is 32 + 32 = 64   ( bits ) .
In 2001, Fridrich et al. [27] proposed the use of RS steganalysis to detect whether an image has a secret message in it [28]. The technology uses a judgment function and a flipping function to divide the pixels into two groups. The judgment function separates the groups into two types, based on smoothness and regularity. The flipping function segregates the groups into three categories: Regular (R), Singular (S), and Unusable (U). The technology applies two masks M = [1 0 0 1] and -M = [−1 0 0 −1] to calculate the percentages of regular, singular, and unusable that are marked by R_M_G, R_FM_G, S_M_G, S_FM_G, U_M_G, and U_FM_G, respectively. The hypotheses are R_M_G ≅ R_FM_G, S_M_G ≅ S_FM_G, and U_M_G ≅ U_FM_G. Figure 15 and Figure 16 are the RS steganalysis results of Mandrill.
From the figures, we can see that the curve of R_M_G is close to that of R_FM_G. The curves of S_M_G, S_FM_G, U_M_G, and U_FM_G have the same shapes. Therefore, the proposed scheme can against the RS steganalysis.

5. Conclusions and Future Works

In this paper, a modified LSB matching method using the dual-image and likelihood recording strategy is proposed. The scheme analyzes all possible modifications under all hidden conditions and re-encodes each combination according to the frequency of its occurrence. The combination with a higher occurrence rate is re-encoded with a lower modification rule. The experimental results show that the embedding capacity of the proposed method is like the method used in Tseng et al.’s scheme. Moreover, the image quality of the proposed scheme is the highest among the comparison methods. Furthermore, the proposed scheme against the steganalysis attacks.
The reason why the proposed scheme can get higher image quality is because the scheme transforms the worst cases with better encode results. In general, each worst case may make two images distance where one pixel is -1 and the other one is +1. That means the case will generate 2 2 = 4 squared errors for computing the image quality. In the proposed scheme, the worst case is re-encoded with the minimum distortion code 0. Hence, the stego-pixel is the same with the original one such that the image distance is 0. The image distortion can be effectively reduced. The proposed scheme is especially suitable for simple secret image such as logo, cartoons, and signature. On the contrary, the proposed scheme can only get a few increasing while the secret image is a uniform image.
In the future, we will try to figure out how to re-encode the secret image according to its characteristic. The scheme needs adaptively or elastically change the encoding strategy such as running encoding or Huffman coding, to encode the different cases to further reduce the image distortion, or filter the bad cases, which will cause huge damage in the pre-processing procedure. Furthermore, add more translation tables to improve the image quality.

Author Contributions

T.-C.L. created the idea, wrote the paper, corrected the program; P.-C.Y. wrote the paper, run the program; B.J. write the paper, corrected the paper. All authors have read and agreed to the published version of the manuscript.

Funding

Ministry of Science and Technology (MOST), Taiwan, Republic of China MOST 109-2221-E-324-025-MY3.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors gratefully acknowledge the financial support of this study from the Ministry of Science and Technology (MOST), Taiwan, Republic of China, under the Grant MOST 109-2221-E-324 -025 -MY3. The authors also want to thank the reviewers who give us great review comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hussain, M.; Wahab, A.W.A.; Idris, Y.I.B.; Ho, A.T.; Jung, K.H. Image Steganography in Spatial Domain: A Survey. Signal Process. Image Commun. 2018, 65, 46–66. [Google Scholar] [CrossRef]
  2. Liao, X.; Shu, C. Reversible Data Hiding in Encrypted Images Based on Absolute Mean Difference of Multiple Neighboring Pixels. J. Vis. Commun. Image Represent. 2015, 28, 21–27. [Google Scholar] [CrossRef]
  3. Qin, C.; Chang, C.C.; Hsu, T.J. Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images. Multimed. Tools Appl. 2015, 74, 5861–5872. [Google Scholar] [CrossRef]
  4. Chen, X.Y.; Gao, G.Y.; Liu, D.D.; Xia, Z.H. Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences. China Commun. 2016, 13, 66–73. [Google Scholar] [CrossRef]
  5. Jana, B. Dual Image Based Reversible Data Hiding Scheme Using Weighted Matrix. Int. J. Electron. Inf. Eng. 2016, 5, 6–19. [Google Scholar]
  6. Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A Reversible Data Hiding Scheme Based on Dual Steganographic Images. In Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 15–16 January 2009; pp. 228–237. [Google Scholar]
  7. Lee, C.F.; Huang, Y.L. Reversible Data Hiding Scheme Based on Dual Stegano-Images Using Orientation Combinations. Telecommun. Syst. 2013, 52, 2237–2247. [Google Scholar] [CrossRef]
  8. Lu, T.C.; Chang, T.C.; Shen, J.J. An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme. IEEE Access 2020, 8, 90824–90837. [Google Scholar] [CrossRef]
  9. Lu, T.C.; Wu, J.H.; Huang, C.C. Dual-Image-Based Reversible Data Hiding Method Using Center Folding Strategy. Signal Process. 2015, 115, 195–213. [Google Scholar] [CrossRef]
  10. Sahu, A.K.; Swain, G. A Review on LSB Substitution and PVD Based Image Steganography Techniques. Indones. J. Electr. Eng. Comput. Sci. 2016, 2, 712–719. [Google Scholar] [CrossRef]
  11. Sahu, A.K.; Swain, G. An Improved Data Hiding Technique Using Bit Differencing and LSB Matching. Internetworking Indones. J. 2018, 10, 17–21. [Google Scholar]
  12. Sahu, A.K.; Swain, G.; Babu, E.S. Digital Image Steganography Using Bit Flipping. Cybern. Inf. Technol. 2018, 18, 69–80. [Google Scholar] [CrossRef] [Green Version]
  13. Shaji, C.; Shatheesh, I. Dual Encoding Approach with Sequence Folding for Reversible Data Hiding in Dual Stego Images. Multimed. Tools Appl. 2021, 80, 13595–13614. [Google Scholar] [CrossRef]
  14. Jafar, F.; Darabkh, K.A.; Al-Zubi, R.T.; Saifan, R.R. An Efficient Reversible Data Hiding Algorithm Using Two Steganographic Images. Signal Process. 2016, 128, 98–109. [Google Scholar] [CrossRef]
  15. Jung, K.H. Dual Image Based Reversible Data Hiding Method Using Neighbouring Pixel Value Differencing. Imaging Sci. J. 2015, 63, 398–407. [Google Scholar] [CrossRef]
  16. Kumar, A.S.; Swain, G. Dual Stego-imaging Based Reversible Data Hiding Using Improved LSB Matching. Int. J. Intell. Eng. Syst. 2019, 12, 63–74. [Google Scholar]
  17. Kumar, A.S.; Swain, G. Reversible Image Steganography Using Dual-Layer LSB Matching. Sens. Imaging 2020, 21, 1. [Google Scholar]
  18. Fadil, A.J. An Extensive Analysis and Conduct Comparative Based on Statistical Attach of LSB Substitution and LSB Matching. Int. J. Eng. Technol. 2020, 7, 4008–4023. [Google Scholar] [CrossRef]
  19. Hiary, H.; Sabri, K.E.; Mohammed, M.S. A Hybrid Steganography System Based on LSB Matching and Replacement. Int. J. Adv. Comput. Sci. Appl. 2016, 7, 374–380. [Google Scholar] [CrossRef] [Green Version]
  20. Kumar, A.; Swain, G. High Fidelity Based Reversible Data Hiding Using Modified LSB Matching and Pixel Difference. J. King Saud Univ. Comput. Inf. Sci. 2019. [Google Scholar] [CrossRef]
  21. Hwang, M.S.; Xie, M.R.; Wu, C.C. A Reversible Hiding Technique Using LSB Matching for Relational Databases. Informatica 2020, 31, 481–497. [Google Scholar] [CrossRef]
  22. Mielikainen, J. LSB Matching Revisited. IEEE Signal Process. Lett. 2006, 13, 285–287. [Google Scholar] [CrossRef]
  23. Yang, G.; Li, X.; Li, B.; Guo, Z. A New Detector of LSB Matching Steganography Based on Likelihood Ratio Test for Multivariate Gaussian Covers. In Proceedings of the 2015 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Hong Kong, China, 6–19 December 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 757–760. [Google Scholar]
  24. Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual Imaging-based Reversible Hiding Technique Using LSB Matching. Signal Process. 2015, 108, 77–89. [Google Scholar] [CrossRef]
  25. Tseng, H.W.; Lu, H.X.; Leng, H.S. Dual Image Reversible Data Hiding Based on Modified LSB Matching Method. Recent Adv. Intell. Inf. Hiding Multimed. Signal Process. 2019, 109, 256–263. [Google Scholar]
  26. Wang, Y.L.; Shen, J.J.; Hwang, M.S. An Improved Dual Image-Based Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 2017, 19, 858–862. [Google Scholar]
  27. Fridrich, J.; Goljan, M. Practical Steganalysis of Digital Images—State of the Art. In Proceedings of the SPIE—The International Society for Optical Engineering, San Jose, CA, USA, 27 December 2002; Volume 4675. [Google Scholar]
  28. Swain, G. Digital Image Steganography Using Eight Directional PVD against RS Analysis and PDH Analysis. Adv. Multimed. 2018, 2018, 1–13. [Google Scholar] [CrossRef]
Figure 1. LSB matching hiding flowchart.
Figure 1. LSB matching hiding flowchart.
Entropy 23 00577 g001
Figure 2. The flowchart of the dual-image LSB matching method proposed by Lu et al.
Figure 2. The flowchart of the dual-image LSB matching method proposed by Lu et al.
Entropy 23 00577 g002
Figure 3. The flowchart of the dual-image LSB matching method by Wang et al.
Figure 3. The flowchart of the dual-image LSB matching method by Wang et al.
Entropy 23 00577 g003
Figure 4. Dual-image modified LSB matching hiding flowchart by Tseng et al.
Figure 4. Dual-image modified LSB matching hiding flowchart by Tseng et al.
Entropy 23 00577 g004
Figure 5. Diagram of the proposed method.
Figure 5. Diagram of the proposed method.
Entropy 23 00577 g005
Figure 6. An embedding example.
Figure 6. An embedding example.
Entropy 23 00577 g006
Figure 7. The mapping of ρ = 3 to its corresponding ρ ^ and messages m 1 and m 2 .
Figure 7. The mapping of ρ = 3 to its corresponding ρ ^ and messages m 1 and m 2 .
Entropy 23 00577 g007
Figure 8. The mapping of ρ = 0 to its messages m 1 = 1 and m 2 = 0 .
Figure 8. The mapping of ρ = 0 to its messages m 1 = 1 and m 2 = 0 .
Entropy 23 00577 g008
Figure 9. The extraction example of Figure 6.
Figure 9. The extraction example of Figure 6.
Entropy 23 00577 g009
Figure 10. The six test images (a) Lena (b) Mandrill (c) Pepper (d) Airplane (e) Lake (f) Tiffany each of them has different characteristics.
Figure 10. The six test images (a) Lena (b) Mandrill (c) Pepper (d) Airplane (e) Lake (f) Tiffany each of them has different characteristics.
Entropy 23 00577 g010
Figure 11. The experimental results of Lena.
Figure 11. The experimental results of Lena.
Entropy 23 00577 g011
Figure 12. The experimental results of Mandrill.
Figure 12. The experimental results of Mandrill.
Entropy 23 00577 g012
Figure 13. The experimental results of Tiffany with the secret image Mandrill.
Figure 13. The experimental results of Tiffany with the secret image Mandrill.
Entropy 23 00577 g013
Figure 14. The fixed secret images ‘Tiffany’ and ‘CYUT Bird’.
Figure 14. The fixed secret images ‘Tiffany’ and ‘CYUT Bird’.
Entropy 23 00577 g014
Figure 15. The RS analysis result of the first stego image of Mandrill.
Figure 15. The RS analysis result of the first stego image of Mandrill.
Entropy 23 00577 g015
Figure 16. The RS analysis result of the second stego image of Mandrill.
Figure 16. The RS analysis result of the second stego image of Mandrill.
Entropy 23 00577 g016
Table 1. The seven Modification Rules designed by Lu et al.
Table 1. The seven Modification Rules designed by Lu et al.
RulePixel Value ConditionFinal Adjustment
T A T B T A T B A B A B
100−10 A + 2 B + 1 A 1 B + 1
20101 A B + 1 A B 1
301−10 A + 2 B A 1 B
4−1000 A 1 B A + 2 B + 1
5−1001 A 1 B A + 2 B
6−10−10 A 1 B + 2 A + 1 B 1
71010 A 1 B 1 A + 1 B + 2
Table 2. The Modify Rules Table designed by Wang et al.
Table 2. The Modify Rules Table designed by Wang et al.
CasePixel Value ConditionFinal Adjustment
T A T B T A T B A B A B
100−10 A + 2 B + 3 . A 1 B 2
20101 A B + 3 A B 3
301−10 A + 2 B 1 A 2 B + 2
4−1000 A 1 B 2 A + 2 B + 3
5−1001 A 1 B + 2 A + 2 B 2
6−10−10 A 1 B + 4 A + 1 B 3
71010 A 1 B 3 A + 1 B + 4
80001 A B 2 A B + 3
91001 A + 1 B 2 A B + 3
100110 A B + 3 A + 1 B 2
110100 A B + 3 A B 2
Table 3. Embedding Rules Table of the proposed scheme.
Table 3. Embedding Rules Table of the proposed scheme.
A L S B ( A ) F ( A ,   A ) m 1 m 2 A A Distortion ( δ ) Ordering ( ρ )
Even00000000
010+111
10+1012
11−1+123
1000+111
010000
10−1+123
11+1012
Odd1100+1011
01−1+123
100+112
110000
000−1+123
01+1011
100000
110+112
Table 4. The Re-encoding Table of the proposed scheme.
Table 4. The Re-encoding Table of the proposed scheme.
A L S B ( A ) F ( A ,   A ) m 1 m 2 t γ δ ρ ρ ^
Even00000 γ 0 0 ( 0 ) δ 0 0 ( 0 ) ρ 0 0 ( 0 ) ρ ^ 0 0 ( 0 )
011 γ 0 0 ( 1 ) δ 0 0 ( 1 ) ρ 0 0 ( 1 ) ρ ^ 0 0 ( 1 )
102 γ 0 0 ( 2 ) δ 0 0 ( 2 ) ρ 0 0 ( 2 ) ρ ^ 0 0 ( 2 )
113 γ 0 0 ( 3 ) δ 0 0 ( 3 ) ρ 0 0 ( 3 ) ρ ^ 0 0 ( 3 )
1000 γ 1 0 ( 0 ) δ 1 0 ( 0 ) ρ 1 0 ( 0 ) ρ ^ 1 0 ( 0 )
011 γ 1 0 ( 1 ) δ 1 0 ( 1 ) ρ 1 0 ( 1 ) ρ ^ 1 0 ( 1 )
102 γ 1 0 ( 2 ) δ 1 0 ( 2 ) ρ 1 0 ( 2 ) ρ ^ 1 0 ( 2 )
113 γ 1 0 ( 3 ) δ 1 0 ( 3 ) ρ 1 0 ( 3 ) ρ ^ 1 0 ( 3 )
γ F ( A ,   A ) L S B ( A ) ( t ) δ F ( A ,   A ) L S B ( A ) ( t ) ρ F ( A ,   A ) L S B ( A ) ( t ) ρ ^ F ( A ,   A ) L S B ( A ) ( t )
Table 5. A Re-encoding Table example.
Table 5. A Re-encoding Table example.
A L S B ( A ) F ( A ,   A ) t m 1 m 2 γ δ ρ θ δ ^ ρ ^ θ ^
Even00000500001150
1014011402380
21013512135000
3114523901245
100012011120000
1015000023100
21060231201260
3118012801180
Odd110001101111011110
10113023260000
2101012102320
311500001250
00003023601230
1012011202340
210100000000
3115012501150
Total distortion 1095 715
Table 6. The final Re-encoding Table.
Table 6. The final Re-encoding Table.
L S B ( A ) F ( A ,   A ) m 1 m 2 t ρ ^ ρ L A L A
000001000
011310+1
10202+10
11323−1+1
1000010+1
0113000
10223−1+1
11312+10
1100011+10
01103−1+1
102320+1
1132000
000023−1+1
01131+10
1020000
113120+1
Table 7. The statistic results of the proposed used the random number and the fixed secret images ‘CYUT Bird’ and ‘Tiffany’.
Table 7. The statistic results of the proposed used the random number and the fixed secret images ‘CYUT Bird’ and ‘Tiffany’.
L S B ( A ) F ( A ,   A ) m 1 m 2 Random Number Generator (RNG)Secret Image: TiffanySecret Image: CYUT Bird
Count% L A L A δ TDCount% L A L A δ TDCount% L A L A δ TD
000016,180 6.17%000- 10,069 3.84%−11220,138 9191 3.51%0119191
0116,362 6.24%01116,362 11,265 4.30%10111,265 8040 3.07%1018040
1016,369 6.24%10116,369 20,508 7.82%01120,508 6544 2.50%−11213,088
1116,534 6.31%−11233,068 23,603 9.00%000- 41,670 15.90%000-
10016,235 6.19%01116,235 10,110 3.86%−11220,220 9137 3.49%0119137
0116,263 6.20%000- 11,445 4.37%10111,445 7934 3.03%1017934
1016,431 6.27%−11232,862 20,468 7.81%01120,468 6575 2.51%−11213,150
1116,463 6.28%10116,463 23,369 8.91%000- 41,746 15.92%000-
110016,506 6.30%10116,506 10,237 3.91%−11220,474 9148 3.49%0119148
0116,585 6.33%−11233,170 11,283 4.30%10111,283 8298 3.17%1018298
1016,444 6.27%01116,444 20,434 7.79%01120,434 6560 2.50%−11213,120
1116,293 6.22%000- 23,874 9.11%000- 41,822 15.95%000-
00016,355 6.24%−11232,710 10,112 3.86%−11220,224 9150 3.49%0119150
0116,257 6.20%10116,257 11,218 4.28%10111,218 7836 2.99%1017836
1016,273 6.21%000- 20,466 7.81%01120,466 6514 2.48%−11213,028
1116,594 6.33%01116,594 23,683 9.03%000- 41,979 16.01%000-
Total distortion:263,040208,143121,120
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lu, T.-C.; Yang, P.-C.; Jana, B. Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy. Entropy 2021, 23, 577. https://doi.org/10.3390/e23050577

AMA Style

Lu T-C, Yang P-C, Jana B. Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy. Entropy. 2021; 23(5):577. https://doi.org/10.3390/e23050577

Chicago/Turabian Style

Lu, Tzu-Chuen, Ping-Chung Yang, and Biswapati Jana. 2021. "Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy" Entropy 23, no. 5: 577. https://doi.org/10.3390/e23050577

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop