Next Article in Journal
Incremental Spectral Clustering via Fastfood Features and Its Application to Stream Image Segmentation
Next Article in Special Issue
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test
Previous Article in Journal
A Review of Image Processing Techniques Common in Human and Plant Disease Diagnosis
Previous Article in Special Issue
Joint Adaptive Coding and Reversible Data Hiding for AMBTC Compressed Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Effective Dual-Image Reversible Hiding for UAV’s Image Communication

1
Aeronautical Systems Research Division, National Chung-Shan Institute of Science and Technology, Taichung 40722, Taiwan
2
Department of Computer Science and Engineering, National Chung Hsing University, Taichung 40227, Taiwan
*
Author to whom correspondence should be addressed.
Symmetry 2018, 10(7), 271; https://doi.org/10.3390/sym10070271
Submission received: 5 June 2018 / Revised: 30 June 2018 / Accepted: 3 July 2018 / Published: 10 July 2018
(This article belongs to the Special Issue Emerging Data Hiding Systems in Image Communications)

Abstract

:
Compared with traditional hiding methods, dual-image reversible data hiding methods have a higher embedding rate and a better quality stego image. Also, this is a special case of secret sharing, because secret data cannot be extracted from any stego image. In the literature, the frequencies of occurrence of secret data were used as reference information for data encoding, in which most digits were transformed into smaller ones. The encoding strategy can effectively decrease the modification level of the pixel. However, only limited literature has analyzed the relationship between the adjacent secret data. In this paper, we proposed an exclusive-or (XOR)-based encoding method to convert the neighboring values, thereby reducing the distortion. Since there are significant similarities between the two stego images and the original image, the first stego image is stored on an unmanned aerial vehicle (UAV) to avoid a hacker’s interception attack. The second stego image on the UAV is sent to the command station. After completion of the UAV mission, the proposed method extracts the secret data from the two stego images to identify whether the second stego image has been tampered with.

1. Introduction

Data hiding means that secret data can be embedded into different multimedia, e.g., digital images, videos, and audio files. After data hiding, the image is very similar to the original one that has been extensively used in various applications, e.g., secret communications, message authentication, and data annotation [1]. Unlike irreversible hiding, reversible data hiding can recover the original image after the data have been extracted, as shown in Figure 1. This property implies that reversible data hiding is very suitable for some special environments that do not allow the distortion of images, i.e., medical and military applications. For example, the private data of a patient were embedded into the medical image, which causes the distortion problem and erroneous judgments by doctors. Figure 2 shows that reversible data hiding methods can be classified mainly into two types, i.e., the frequency domain [2,3] and the spatial domain [4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19]. The frequency domain is used to transform the cover pixels in the image into coefficients and embed data into the coefficients. Consequently, it needs more computational costs.
The current methods in the spatial domain can be classified mainly into five types, i.e., the compression method [4], difference expansion [5], prediction [6,7,8,9,10,11], histogram [12,13,14], and dual-image [15,16,17,18,19,20,21,22,23]. In 2002, Celik et al. [4] proposed a compression-based hiding method that quantified the pixels in the image and recorded the values of remainders, which were used as recovery information. By arithmetic coding, both the recorded values and the secret data were compressed, and the compressed results were embedded into the cover image. However, arithmetic coding requires massive computational costs. Tian [5] proposed a difference expansion method that was different from the compression-based method. In Tian’s method, the difference of a pair of pixels is doubled to embed one secret bit. However, expanding the larger difference in the complexity region of the image causes serious distortion of the stego image. In order to solve this problem, Thodi and Rodriguez [6] proposed a prediction-based hiding method that used the inherent edge-detection method to derive the prediction value of the cover ones. Since the inherent edge-detection analyzes the relationship among three neighboring pixels of the cover pixels, the prediction error is smaller than the difference between two adjacent pixels. Consequently, the expansion level of Thodi and Rodriguez’s method is smaller than that of Tian’s method. In 2008, Fallahpour [8] proposed a gradient-adjusted prediction (GAP) that expanded the number of relationships of neighboring pixels from 3 to 8. However, the inherent edge-detection and GAP cannot generate the prediction value in the boundary of an image. In order to solve this problem, Lee et al. [9] and Qin et al. [10] calculated the mean of several adjacent pixels as the prediction value of the cover pixel. (The above methods can effectively reduce the expanded level, thereby decreasing the modification level of the pixels). However, these methods still had overflow and underflow problems; to avoid them, Ni et al. [12] proposed a histogram shifting method that only modifies the pixels between the peak point and the zero point to reduce the probability of occurrence of the overflow and underflow problems. However, the method still has overflow and underflow problems when there is no zero point that exists in the histogram. In this case, the coordinates of the pixels with the lowest frequency of occurrence were recorded, which decreased hiding capacity. In order to solve this problem, Chen et al. [13] proposed an asymmetric-histogram shifting of prediction errors to increase the number of embeddable pixels. In 2017, Lu et al. [14] used multiple predictors to generate several asymmetric-histograms to reduce the number of shifted pixels.
Lee et al. [16] proposed a method that was different from the above methods. Their method was a dual-image reversible data hiding approach in which four directions were used to embed secret data into two stego images. However, the secret data could not be embedded in some special cases, which decreased the embedding capacity. In order to overcome this problem, Lee et al. [17] expanded the number of directions from 4 to 5. Unlike the direction-based hiding methods, Horng et al. [18] proposed a (k, n)-images hiding method that can embed k secret images into n stego images. Also, the method can embed (nk) meaningfulness images to cheat the hackers or charge them more for the analytical process. In 2015, Lu et al. [19] used the LSB matching rules to embed secret data, in which the maximum modification level of the pixels is controlled within 1; however, the embedding rate was 1 bpp, at most. To enhance the hiding capacity, Lu et al. [20] proposed a center folding strategy that can embed a set of K secret bits into a pair of pixels. In addition, the strategy can effectively reduce the absolute value of the secret digits and decrease the modification level of the pixels. In 2017, Lu et al. [21] improved the center folding strategy further by the appearance frequency of the secret data. However, the strategy does not analyze the relationships between adjacent secret messages. Therefore, Chi et al. [22] proposed a dynamic encoding method that used the similarity of the neighboring data to encode secret data. These methods can effectively reduce the modification level of pixels. In 2017, Yao et al. [23] proposed a selection strategy of shiftable pixels’ coordinates to improve the hiding capacity of the center folding strategy. In addition, the method does not invoke more distortion after embedding extra secret data. However, their method does not analyze the frequency of the occurrence of secret data or their relationships. As most of the secret digits become large, the distortion of the image increases in the data embedding phase.
In this paper, we proposed a XOR-based encoding strategy to transform secret digits into smaller ones, owing to which the adjacent secret data have are highly similar. In addition, the proposed method is combined with the frequency-based encoding strategy to further encode the transformed digits, in which the digit with the highest frequency of occurrence is encoded as the absolute minimum value “0”, and the digit with the lowest frequency of occurrence is encoded as the maximum value. Consequently, the proposed method can effectively decrease the frequency of the modification of pixels and the modification level, and those are the reasons the quality of the stego image of the proposed method is better than that of previous methods.
The rest of the paper is organized as follows. Section 2 and Section 3 describe the selection strategy of shiftable pixels’ coordinates and our method, respectively. Section 4 compares our method and the eight dual-image hiding methods. Conclusions are given in Section 5.

2. Related Method

In 2017, Yao et al. [23] proposed a selection strategy that can embed at least K bits into two pixels. First, a set of K secret bits {S1, S2, …, SK} was transformed into the decimal value d, i.e., d = i = 1 K 2 i 1 × s i and d [ 0 ,   2 K 1 ] . If decimal value d is equal to the maximum value “2K − 1”, then it is increased by one extra secret bit e, i.e.,
d = { d + S i + 1 , if   d = 2 K 1 , d , otherwise .
Finally, the decimal value was embedded into two stego images, i.e.,
P x , y = { P x , y + d / 4 , if   d mod 2 = 0 , P x , y d / 4 , otherwise .
P x , y = { P x , y d / 2 , if   d   mod 2 = 0 , P x , y + d / 2 , otherwise .
in which P x , y and P x , y are the pixels in the first stego image and the second stego image, respectively.
An example is used to illustrate the selection strategy. Let K = 2 and assume that P1,1 = 100 and {S1, S2, S3} = {1, 1, 1}. First, the pair of secret bits {1, 1} was transformed into the decimal value, i.e., d = i = 1 2 2 i 1 × s i = 2 0 × 1 + 2 1 × 1 = 3 . Since the decimal value satisfies the first condition of Equation (1), it can be increased by another secret bit S3, i.e., d = d + S 3 = 3 + 1 = 4 . According to Equations (2) and (3), the value “4” is embedded by P 1 , 1 = P 1 , 1 + d / 4 = 100 + 4 / 4 = 101 and P 1 , 1 = P 1 , 1 4 2 = 101 4 / 2 = 99 .

3. Proposed Method

An effective application and the proposed method are presented in this section. The latter includes the embedding algorithm and the extraction and recovery algorithm.

3.1. Effect Application

To date, digital images on UAVs can be transmitted to the command station wirelessly. However, hackers may interrupt the transmitted images and send fake images to the military. Note that it is difficult for hackers to attack or control UAV. In order to avoid this problem, a dual-image reversible data hiding system must be implemented, as shown in Figure 3. First, the secret data consist of the mission parameters on UAVs, e.g., date of flight, altitude, latitude, and longitude. Second, the secret data were embedded into two stego images, each of which was very similar to the original image.
The first stego image was stored in the storage of UAV. Even if hackers interrupted the transmitted image, the military still obtains the first stego image after aircraft landing. The second stego image was transmitted to the command station; thus, the military can analyze the image immediately. After aircraft landing, the military extracts the first stego image from the storage of UAV and reveals secret data by the two stego images. If the revealed secret data are not equal to the mission parameters on UAV, then the military only records the UAV’s mission parameter and the first stego image in the database. This is because the second stego image is a fake image, which should not be recorded in database. Otherwise, the military can recover the original image losslessly by calculating the mean of the two images. Afterwards, the original image and the mission parameters are inserted into the database.

3.2. Data Embedding Algorithm

Figure 4 shows the data embedding flowchart. Since there is a high correlation coefficient between the mission’s digits, their bytes can be encoded as smaller values by XOR operator, i.e., B i = T ( S i ) T ( S i 1 ) = { b i , 1 ,   b i , 2 ,   ,   b i , 8 } { b i 1 , 1 ,   b i 1 , 2 ,   ,   b i 1 , 8 } = { b 1 , b 2 ,   , b 8 } , in which T(·) denotes the byte of parameters. Note that the byte of the first secret digit remains unchanged, because it does not have the previous secret message, i.e., B1 = T(S1). The XOR operator makes it possible for the different bytes to be transformed effectively into similar bytes.
The above bits are transformed into the decimal digits, i.e.,
d j = { d j + b j + 1 , if   j = 1 K 2 j 1 × b j = 2 k 1 , d j , otherwise .
in which k is a pre-established threshold that determines the control of the hiding capacity and the quality of the stego images. The embedding equation is the same as that of the selection strategy [23], so our maximum hiding capability is equal to that of the selection strategy. However, in the proposed method, the frequencies of the occurrences of decimal digits are counted and sorted in descending order, in which the sorted indices are I ( d j ) and I ( d j ) [ 1 ,   2 K + 1 ] . In other words, the minimum sorted index represents the decimal value with the highest frequency of occurrence.
The sorted indices can be encoded further by
I ( d j ) = { I ( d j ) / 2 , if   I ( d j )   is   an   even   number , I ( d j ) / 2 , otherwise .
The absolute value of I ( d j ) is smaller than the original index, so embedding these reduced values I ( d j ) into the image does not invoke serious distortion. The encoded value I ( d j ) is embedded into the pixels by
P x , y = { P x , y I ( d j ) / 2 , if   P x , y I ( d j ) / 2 > 0   and   P x , y + I ( d j ) / 2 < 255 , P x , y , otherwise .
P x , y = { P x , y + I ( d j ) / 2 , if   P x , y I ( d j ) / 2 > 0   and   P x , y + I ( d j ) / 2 < 255 , P x , y + max ( d j ) / 2 + 1 , if   P x , y I ( d j ) / 2 < 0 , P x , y max ( d j ) / 2 1 , if   P x , y + I ( d j ) / 2 > 255 ,
in which Px,y represents the cover pixel, and P x , y and P x , y represent the pixels in the first and second stego images. The above equation can avoid the overflow and underflow problems, because the proposed method does not embed any secret data when the overflow or underflow problem occurs. To discriminate the non-embeddable pixel-pair or the embeddable pixel-pair, the difference between pixels in the non-embeddable pixel-pair is expanded by max ( d j ) / 2 + 1 , in which the expansion level is higher than that of the embeddable pixel-pair.
Figure 5 shows an example of embedding data. Let K = 2 and assume that two altitudes on UAV are 150 and 157, and their bytes are (10010110)2 and (10011101)2, respectively. The first value remains unchanged, because it does not have a previous value. The byte of the second altitude value can be encoded by the XOR operator, i.e., 11 = (00001011)2 = (10010110)2 ⊕ (10011101)2. After the above procedure, the 16 secret bits (1001011000001011)2 can be embedded by the following procedures.
According to Equation (4), the first and second bits (10)2 are converted into the first decimal value “2”. The remaining bits are transformed by the same procedure. Note that the last set of secret bits (11)2 cannot satisfy Equation (4), because there is no remaining bit in the secret sequence. To solve this problem, the set is padded with one bit (0)2 to successfully convert the secret set as the decimal value “3”. After decimal conversation, the decimal values are {2, 1, 1, 2, 0, 0, 2, 3}.
The occurrence frequencies of decimal values are counted, i.e., {2, 2, 3, 1, 0}. To encode the decimal value as the smaller value effectively, the occurrence frequencies are sorted in descending order, in which the sorted indices are {2, 3, 1, 4, 5}. According to Equation (5), these indices are reduced by {1, −1, 0, 2, −2}. After accomplishing the secret mapping rules, the first decimal value “2” is encoded as “0”. The remaining values are processed by the same procedure to obtain the encoded values {0, −1, −1, 0, 1, 1, 0, 2}.
These encoded values are embedded by the following procedure. Assuming that the nine pixels in the cover image are {150, 157, 156, 156, 157, 158, 153, 155, 154}, the first encoded value “0” is then embedded into the first cover pixel to yield two stego pixels, i.e., P 1 , 1 = P 1 , 1 0 / 2 = 150 0 = 150 and P 1 , 1 = P 1 , 1 + 0 / 2 = 150 + 0 = 150 . The other encoded values are embedded in the same way.

3.3. Data Extraction and Image Recovery Algorithm

Figure 6 shows the flowchart of the data extraction and image recovery. After obtaining two stego images, the difference between the pixels in the two stego images is calculated to identify whether there is an encoded value in the pixel-pair or not, i.e., I ( d j ) = P x , y P x , y . If I ( d j ) = max ( d j ) / 2 + 1 , then there are no secret data. Otherwise, the secret data can be revealed by the following procedures. First, they are expanded by
I ( d j ) = { 2 I ( d j ) , if   I ( d j ) > 0 , 2 × | I ( d j ) | + 1 , otherwise .
Afterwards, according to Equation (4) and the sorted index of the frequency of occurrence, the secret mapping table can be established, as shown in Table 1. The index is mapping by the secret mapping table to obtain the secret bits. Each set of eight secret bits { b 1 , b 2 ,   , b 8 } is re-encoded by XOR operator to recover the mission’s parameters, i.e., T ( S i ) = B i T ( S i 1 ) = { b i , 1 , b i , 2 ,   , b i , 8 } { b i 1 , 1 ,   b i 1 , 2 ,   ,   b i 1 , 8 } = { b i , 1 ,   b i , 2 ,   ,   b i , 8 } , in which T(Si) denotes the byte of the ith mission’s parameter. Note that the first byte keeps unchanged, because it not has the reference digit. Moreover, the image is recovered by
P x , y = { P x , y , if   I ( d j ) = max ( d j ) / 2 + 1 , ( P x , y + P x , y ) / 2 , otherwise .
in which the recovered image is the same as the original image.
The example in Section 3.2 is used repeatedly to illustrate how to extract secret data and recover the original image, as shown in Figure 7. First, the difference between the first pixels in the two stego images is calculated, i.e., I ( d 1 ) = P 1 , 1 P 1 , 1 = 150 150 = 0 . Since I ( d 1 ) < 4 / 2 + 1 , there is one encoded value. According to Equation (8), the encoded value “0” is increased by “1” to obtain the sorted index “1”. The sorted index “1” is mapped by Table 1 to obtain the two secret bits {1, 0}. The difference between the second pixels in the two stego images is calculated, i.e., I ( d 2 ) = P 1 , 2 P 1 , 2 = 157 158 = 1 . According to Equation (8), the encoded value -1 is doubled and increased by 1 to obtain the sorted index “, i.e., I ( d 2 ) = 2 × |−1| − 1 = 3. The sorted index “3” is mapped by Table 1 to obtain the two secret bits {0, 1}. The other secret bits are revealed in the same way. The secret bits are (10010110000010110)2, in which the first set of the eight bits are just the byte of the first altitude value, i.e., S1 = (10010110)2 = 150, and the ninth through sixteenth bits are re-encoded by S2 = B2S1 = (00001011)2 ⊕ (10010110) 2 = (10011101)2 = 157.
Afterwards, the original image is recovered losslessly by calculating the mean of the pixels in the same position of the two stego images. For example, the mean of the first pixels in the two stego images is just the first pixel in the original image, i.e., P 1 , 1 = ( 150 + 150 ) / 2 = 150 . Then, the mean of the second pixels in the two stego image is just the second pixel of the original image, i.e., P 1 , 2 = ( 158 + 157 ) / 2 = 157 .

4. Experimental Results

The experimental environment consists of a PC with 3.3 GHz intel® Core (TM) i5-4590 and 4 GB RAM with Window 7 Professional. In addition, the proposed method was developed by MATLAB R2017a. Figure 8 and Figure 9 show six secret images and the first six images of 1338 UCID images, respectively. Each UCID image is used as the cover image. The measurement indexes of the experiments include the embedding rates R and the PSNR values, and are expressed as
R = S 2 × L × W ( bpp ) ,
PSNR = 10 × log 10 ( 255 2 MSE ) ( dB ) ,   where   MSE =   1 L × W x = 1 L y = 1 W ( P x , y P x , y ) 2 ,
in which ||S|| is the number of secret bits; L and W are the length and width of the cover image, respectively; MSE is the mean square error between the stego image P x , y , and the cover image P x , y . Consequently, a higher value of R implies that the hiding method can embed more secret data. In addition, a higher value of PSNR indicates that there is a high similarity between the stego image and the cover image.
The other measurement index is the SSIM index, i.e.,
SSIM = ( P ,   P ) = ( 2 μ P μ P + C 1 ) ( 2 σ P P + C 2 ) / ( μ P 2 + μ P 2 + C 1 ) ( σ P 2 + σ P 2 + C 2 )
in which P and P are the cover image and the stego image, respectively; μ P and μ P are the means of the pixels in P and P , respectively; C1 and C2 are two constants that assure that the denominator is greater than 0, in which C1 = C2 = 1; and σ P and σ P are the standard deviations of the pixels in the two images that compare the contrast between the two images. As the value of SSIM increases, the visual quality of the stego image gets better.
In theory, the performance of the proposed method is analyzed as follows. Assume that each pixel in the cover image does not have an overflow or underflow problem. The minimum embedding rate is K/2 bpp, because a pair of pixels can be used to embed at least two secret bits. In addition, the maximum embedding rate is (K + 1)/2 bpp due to the (K + 1) secret bits that may be embedded into a pair of pixels. In general, the expected embedding rate is derived according to the possibility of occurrence of patterns of K secret bits, i.e., {1/2K, 1/2K, …, 1/2K, 1/2K+1, 1/2K+1}. The equation of the expected embedding rate is as follows:
R ¯ = 1 2 × [ ( 2 K 1 ) × K 2 K + 2 × ( K + 1 ) 2 K + 1 ] .
Assume that K = 2. The secret patterns of K = 2 are {00, 01, 10, 110, 111}, and the possibilities of occurrence are {0.25, 0.25, 0.25, 0.125, 0.125}. According to Equation (13), the expected embedding rate can be obtained, i.e., R ¯ = 1 2 × [ ( 4 1 ) × 2 4 + 2 × ( 2 + 1 ) 8 ] = 1.125 .
The PSNR value in theory is analyzed as follows. Assume that all of the secret digits are 0. These digits will be encoded as “0” by the proposed method. Embedding the decimal digits “0” into the image does not invoke any distortion; thus, the stego image is lossless. In the second case, all of the secret digits are 255. By the XOR operator, the first secret digit is unchanged, and the other digits are transformed into “0”. Then, the eight bits of the first secret digit are embedded dispersedly into 8/K pairs of pixels, and the bits of the other digits are embedded without any distortion of the modification of the pixels. The frequency and level of modification of pixels of the proposed method are significantly smaller than that of Yao et al.’s method [23], because they did not use the frequency of the occurrence of secret data or the relationship between the adjacent digits for encoding the secret data. In the third case, the possibilities of occurrence of (2K + 1) patterns of K secret bits are the same, which causes the ineffectiveness of the frequency-based encoding strategy. Their possibilities are expressed as {1/(2K + 1), 1/(2K + 1), …, 1/(2K + 1)}, and the modification levels are {|−2K−1|, |−2K−1| + 1, …, |2K−1|}; thus, the expected modification levels can be calculated by
M ¯ = 1 2 × i = 0 2 K 1 2 K + 1 × ( | 2 k 1 + i | )
In the worst case, overflow or underflow problems occur on each of the cover pixels. All of the cover pixels are modified by max ( d j ) / 2 + 1 ; thus, the modification level is max ( d j ) / 2 + 1 . However, the possibility of the occurrence of the worst case is very low.
Assume that K = 2. According to Equation (14), the modification level of a pixel on average is M ¯ = 1 2 × ( 0.2 × | 2 | + 0.2 × | 1 | + 0.2 × 0 + 0.2 × | 1 | + 0.2 × | 2 | = 0.6 , and it is substituted into the PSNR formula, Equation (11), to obtain the expected PSNR value of the proposed method, i.e.,
PSNR = 10 × log 10 ( 255 2 0.6 ) = 50.35   ( dB )
Afterwards, assume that K = 2 and that all of the cover pixels have overflow or underflow problems. The modification level of the pixels in the second stego image is 3, and it is substituted into the PSNR formula, i.e.,
PSNR = 10 × log 10 ( 255 2 3 ) = 43.35   ( dB )
The first experiment mainly set an appropriate K. Figure 10 shows the experimental results. When K = 4, a few PSNR values were smaller than 40 dB, and the SSIM values were also smaller than 0.9. This is because the number of pixels with overflow or underflow problems grew as the K value increased. Table 2 listed that the number of images with overflow or underflow problems of K = 4 is 59 more than that of K = 2. When K = 4, the total number of the pixels with overflow or underflow problems is 91,501. In addition, the modification level of the non-embeddable pixels is max ( d j ) / 2 + 1 = 16 / 2 + 1 = 9 , which is greater than that of K = 3, max ( d j ) / 2 + 1 = 8 / 2 + 1 = 5 . These reasons cause the PSNR value to be smaller than 40 dB and the SSIM value to be smaller than 0.9. Consequently, the maximum value of K must be limited to 4 or less. For the same embedding rate, the PSNR value became larger as the K value decreased. This explains that the proposed method can effectively embed secret data into the entire image with the smaller K value. Additionally, for larger K values, only a part of the image is used to embed the secret data. In other words, a part of pixels suffered from the larger modification. As a result, the appropriate K is set to 2.
Figure 11 compares the eight related methods and the proposed method. The seven related methods [15,16,17,18,19,20,23] did not use the frequency of the occurrence of secret data or the relationship of the adjacent secret data to encode secret data, thus embedding secret data invokes serious distortion of the image. The reason confirms that the proposed method has better image quality than the seven related methods [15,16,17,18,19,20,23]. To be more precise, the PSNR values of the proposed method are at least 1.6 dB more than that of the selection strategy [23]. For the secret image Google, the PSNR value of the proposed method is at least 11.98 dB more than that of the selection strategy, because Google consists of more values of 255. The proposed method can transform these digits from 255 to 0, thereby reducing the modification level of pixels. Although the dynamic encoding strategy used codebook to encode adjacent secret data after decimal transformation, the transformation decreases the relationship between the adjacent secret data. Our encoding strategy is different from the dynamic encoding strategy due to the fact it is executed before transforming the K secret bits; thus, the proposed method keeps the significant relationship between the adjacent secret data to encode secret data. The advantage explains why the PSNR value of the proposed method is at least 0.98 dB more than that of the dynamic encoding method for all images.

5. Conclusions

In this paper, we propose a dual-image reversible data hiding structure that achieves three advantages. The first stego image is stored on the storage of UAV, and the second stego image is sent to the command station. For the first advantage, even if hackers interrupt the second stego image, the military obtains the first stego image that is highly similar after aircraft landing. For the second advantage, the command station can immediately analyze the content of the second stego image. For the third advantage, the proposed method can effectively detect tampered images.
In addition, we propose an XOR-based encoding strategy that uses the significant relationship between adjacent secret data to transform the secret data from large digits to smaller digits. Our encoding strategy is different from previous methods, because it is executed before transforming the K secret bits. The transformation decreases the relationship between the adjacent secret data. Consequently, the proposed method is superior to the previous methods. In the future, we will try to embed the mission’s parameters into videos on UAV.

Author Contributions

Y.I. Lin proposed the application and the algorithms. Y.H. Huang wrote this manuscript. C.C. Chen conducted experiments. All authors read and approved the final manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. Information hiding—A Survey. Proc. IEEE 1999, 87, 1062–1078. [Google Scholar] [CrossRef]
  2. Chan, Y.K.; Chen, W.T.; Yu, S.S.; Ho, Y.A.; Tsai, C.S.; Chu, Y.P. A HDWT-based reversible data hiding method. J. Syst. Softw. 2009, 82, 411–421. [Google Scholar] [CrossRef]
  3. Yang, W.C.; Chen, L.H. Reversible DCT-based data hiding in stereo images. Mult. Tools Appl. 2015, 74, 7181–7193. [Google Scholar] [CrossRef]
  4. Celik, M.U.; Sharma, G.; Tekalp, A.M.; Saber, E. Reversible data hiding. IEEE Trans. Image Proc. 2005, 14, 253–266. [Google Scholar] [CrossRef]
  5. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Tech. 2003, 13, 890–896. [Google Scholar] [CrossRef]
  6. Thodi, D.M.; Rodriguez, J.J. Prediction-error based reversible watermarking. IEEE Image Proc. 2004, 3, 1549–1552. [Google Scholar]
  7. Thodi, D.M.; Rodriguez, J.J. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Proc. 2007, 16, 721–730. [Google Scholar] [CrossRef]
  8. Fallahpour, M. Reversible image data hiding based on gradient adjusted prediction. IEICE Electron Expr. 2008, 5, 870–876. [Google Scholar] [CrossRef] [Green Version]
  9. Lee, C.F.; Chen, H.L.; Tso, H.K. Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J. Syst. Softw. 2010, 83, 1864–1872. [Google Scholar] [CrossRef]
  10. Qin, C.; Chang, C.C.; Liao, L.T. An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recogn. Lett. 2012, 33, 2166–2172. [Google Scholar] [CrossRef]
  11. Qin, C.; Chang, C.C.; Huang, Y.H.; Liao, L.T. An inpainting-assisted reversible steganographic scheme using histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Tech. 2013, 23, 1109–1118. [Google Scholar] [CrossRef]
  12. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Tech. 2006, 16, 354–362. [Google Scholar]
  13. Chen, X.; Sun, X.; Sun, H.; Zhou, Z.; Zhang, J. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 2013, 86, 2620–2626. [Google Scholar] [CrossRef] [Green Version]
  14. Lu, T.C.; Chen, C.M.; Lin, M.C.; Huang, Y.H. Multiple predictors hiding scheme using asymmetric histograms. Multimed Tools Appl. 2017, 76, 3361–3382. [Google Scholar] [CrossRef]
  15. Jana, B.; Giri, D.; Mondal, S.K. Dual-image based reversible data hiding scheme using pixel value difference expansion. Inter. J. Netw. Sec. 2016, 18, 633–642. [Google Scholar]
  16. Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A reversible data hiding scheme based on dual steganographic images. In Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 15–16 January 2009; pp. 228–237. [Google Scholar]
  17. Lee, C.F.; Huang, Y.L. Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 2013, 52, 2237–2247. [Google Scholar] [CrossRef]
  18. Horng, G.; Huang, Y.H.; Chang, C.C.; Liu, Y. (k, n)-image reversible data hiding. J. Inf. Hiding Multimed. Signal Proc. 2014, 5, 152–164. [Google Scholar]
  19. Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual imaging-based reversible hiding technique using LSB matching. Signal Proc. 2015, 108, 77–89. [Google Scholar] [CrossRef]
  20. Lu, T.C.; Wu, J.H.; Huang, C.C. Dual-image-based reversible data hiding method using center folding strategy. Signal Proc. 2015, 15, 195–213. [Google Scholar] [CrossRef]
  21. Lu, T.C.; Chi, L.P.; Wu, C.H.; Chang, H.P. Reversible data hiding in dual stego-images using frequency-based encoding strategy. Multimed. Tools Appl. 2017, 76, 23903–23929. [Google Scholar] [CrossRef]
  22. Chi, L.P.; Wu, C.H.; Chang, H.P. Reversible data hiding in dual stegano-image using an improved center folding strategy. Multimed. Tools Appl. 2017, 77, 1–19. [Google Scholar] [CrossRef]
  23. Yao, H.; Qin, C.; Tang, Z.; Tian, Y. Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels’ coordinates with minimum distortion. Signal Proc. 2017, 135, 26–32. [Google Scholar] [CrossRef]
Figure 1. Reversible data hiding.
Figure 1. Reversible data hiding.
Symmetry 10 00271 g001
Figure 2. Classification of reversible data hiding methods.
Figure 2. Classification of reversible data hiding methods.
Symmetry 10 00271 g002
Figure 3. Reversible data hiding for UAV’s image communication.
Figure 3. Reversible data hiding for UAV’s image communication.
Symmetry 10 00271 g003
Figure 4. Flowchart of the proposed method for embedding data.
Figure 4. Flowchart of the proposed method for embedding data.
Symmetry 10 00271 g004
Figure 5. Example of our data embedding.
Figure 5. Example of our data embedding.
Symmetry 10 00271 g005
Figure 6. Flowchart of our data extraction and image recovery process.
Figure 6. Flowchart of our data extraction and image recovery process.
Symmetry 10 00271 g006
Figure 7. Example of our data extraction and image recovery.
Figure 7. Example of our data extraction and image recovery.
Symmetry 10 00271 g007
Figure 8. Six secret images: (a) logo, (b) brain, (c) IM, (d) dolphin, (e) Google, and (f) random image.
Figure 8. Six secret images: (a) logo, (b) brain, (c) IM, (d) dolphin, (e) Google, and (f) random image.
Symmetry 10 00271 g008
Figure 9. First six cover images in 1338 images that were obtained from the uncompressed color image database (UCID). (a) house; (b) statue; (c) chair; (d) trail; (e) people; (f) pavilion.
Figure 9. First six cover images in 1338 images that were obtained from the uncompressed color image database (UCID). (a) house; (b) statue; (c) chair; (d) trail; (e) people; (f) pavilion.
Symmetry 10 00271 g009
Figure 10. PSNR values and SSIM values of 1338 images obtained by various K values with the maximum embedding rate: (a) and (b) K = 2; (c) and (d) K = 3; (e) and (f) K = 4.
Figure 10. PSNR values and SSIM values of 1338 images obtained by various K values with the maximum embedding rate: (a) and (b) K = 2; (c) and (d) K = 3; (e) and (f) K = 4.
Symmetry 10 00271 g010aSymmetry 10 00271 g010b
Figure 11. Comparison of the proposed method with eight related methods [15,16,17,18,19,20,22,23], in which the cover image is used to embed difference secret images: (a) Brain; (b) Dolphin; (c) Google; (d) IM; (e) Logo.
Figure 11. Comparison of the proposed method with eight related methods [15,16,17,18,19,20,22,23], in which the cover image is used to embed difference secret images: (a) Brain; (b) Dolphin; (c) Google; (d) IM; (e) Logo.
Symmetry 10 00271 g011aSymmetry 10 00271 g011bSymmetry 10 00271 g011c
Table 1. Secret mapping table.
Table 1. Secret mapping table.
Sorted IndicesDecimal ValuesSecret Patterns
20{0, 0}
31{0, 1}
12{1, 0}
43{1, 1, 0}
54{1, 1, 1}
Table 2. Number of overflow and underflow problems using different K.
Table 2. Number of overflow and underflow problems using different K.
KNumber of Images Having the Overflow or Underflow ProblemsNumber of Pixels Having the Overflow or Underflow Problems
2118583,313
3121590,376
4124491,501

Share and Cite

MDPI and ACS Style

Lin, Y.-I.; Huang, Y.-H.; Chen, C.-C. An Effective Dual-Image Reversible Hiding for UAV’s Image Communication. Symmetry 2018, 10, 271. https://doi.org/10.3390/sym10070271

AMA Style

Lin Y-I, Huang Y-H, Chen C-C. An Effective Dual-Image Reversible Hiding for UAV’s Image Communication. Symmetry. 2018; 10(7):271. https://doi.org/10.3390/sym10070271

Chicago/Turabian Style

Lin, Yung-I, Ying-Hsuan Huang, and Chih-Cheng Chen. 2018. "An Effective Dual-Image Reversible Hiding for UAV’s Image Communication" Symmetry 10, no. 7: 271. https://doi.org/10.3390/sym10070271

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop