Next Article in Journal
An Eccentric Binary Blackhole in Post-Newtonian Theory
Next Article in Special Issue
Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts
Previous Article in Journal
Role of Power Converters in Inductive Power Transfer System for Public Transport—A Comprehensive Review
Previous Article in Special Issue
An Anomaly-Based IDS Framework Using Centroid-Based Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images

1
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2
School of Big Data and Artificial Intelligence, Fujian Polytechnic Normal University, Fuzhou 350300, China
3
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung 41170, Taiwan
4
AI Research Center, Hon Hai Research Institute, Taipei 114699, Taiwan
*
Authors to whom correspondence should be addressed.
Symmetry 2022, 14(3), 509; https://doi.org/10.3390/sym14030509
Submission received: 6 December 2021 / Revised: 20 January 2022 / Accepted: 23 February 2022 / Published: 2 March 2022

Abstract

:
Reversible data hiding (RDH) in dual images is a technique that shares secret messages into two similar shadow images, while the secret messages and the cover image can be restored only when those two shadows are gathered simultaneously. In this paper, a novel turtle shell-based RDH hiding scheme based on the symmetric property is presented in order to increase the embedding capacity and maintain good visual quality in dual images under the guidance of position-aware. First, we classify each pixel pair into one of four types according to their locations and then determine a sunflower area centered around it in order to construct the combination of positions and the embedding table. Using the embedding table, the secret messages are concealed into a cover image by generating two shadow images. At the decoder’s side, the complete restoration of the secret messages and the cover image can be accomplished by identifying the position relationship between the two stego-pixel pairs. The experimental results confirmed that the proposed position-aware guided RDH scheme is superior to some of the relevant works on the aspects of embedding capacity or image quality. In addition, the proposed scheme provides a secure communication that can effectively resist attacks on the pixel value difference histogram, relative entropy, and regular singular analysis.

1. Introduction

With the development of computer science and tele-communication, the acquisition and sharing of messages have become easy and fast. However, due to the openness and the transparent nature of the Internet, the messages that users transmit can be stolen easily by criminals. This real-world issue motivated this case study of secure covert communication. In order to address this issue, a scheme using data hiding (DH) [1,2,3], also named information hiding, to imperceptibly transmit secret messages has been explored over the past decades. Those DH algorithms generally focus on carrying a larger embedding capacity, but do not consider its reversibility. Simultaneously, reversible data hiding (RDH) [4,5,6], as another branch of DH, is used extensively in many applications because of its reversibility, such as the secure transmission of military images or medical images.
RDH is one technique that can be used to embed secret messages into a cover image, and, at the decoder’s side, the cover image and the secret messages can be restored losslessly. Without loss of generality, RDH schemes can be grouped roughly into five classes, i.e., (1) difference expansion [7,8], (2) prediction-error expansion [9,10], (3) histogram shifting [11,12], (4) pixel-value ordering [13,14], and (5) machine learning-based steganography [15,16]. One of the key points of these RDH schemes is how to maintain the visual quality of stego-images, even at the expense of the partial amount of the embedded secret messages.
In recent years, RDH schemes in dual images have attracted a lot of attention because they can be used to share secret messages [17,18,19,20,21,22,23,24,25]. These RDH schemes insert the secret messages into a cover image so that two similar shadow images are generated. Subsequently, the lossless restoration of the secret messages and the cover image only can be accomplished when the decoder has access to those two shadow images. According to our best knowledge, the first RDH scheme in two shadow images was pioneered by Chang et al. [17] in 2007. In this scheme, two 5-ary digits are carried by two shadow images according to the exploiting modification direction (EMD)-based reference matrix. The embedding capacity (EC) of their scheme is approximately 1.0 bpp, and the peak signal-to-noise ratio (PSNR) of the shadow images reaches 45.33 dB, on average. In 2009, Lee et al.’s scheme [18] exploited four directions of each pixel pair in order to represent two 4-ary secret digits. In order to ensure reversibility, the orientation relationship between the pixel pairs of the two shadow images is used to determine whether or not the second 4-ary secret digit could be concealed in the latter pixel pair. Although the average PSNR of the shadow images is up to 52.30 dB, their ER is no more than 0.75 bpp. Considering the disadvantages of the schemes [17,18], Lee and Huang’s scheme [19] increases the ER up to 1.04 bpp, while maintaining a better image quality through the joint use of improved orientation combinations and the upgraded 5-ary numeral system.
In 2018, with the guidance of the turtle shell-based DH scheme published by Chang et al. [3], Liu and Chang [20] proposed a novel RDH scheme in two shadow images where the variable secret digit is carried using a pixel pair that is duplicated from a pixel of the cover image. Concretely, an 8-ary secret digit will be concealed when the pixel pair is identified to be a back element; conversely, for a pixel pair that belongs to the edge element, only a 2-ary secret digit will be carried. In 2019, Lin et al. [22] observed that there was room for improvement in the design of the turtle shell-based reference matrix, and their scheme succeeded in embedding a 2-ary secret digit into the pixel pair of the first shadow image and a 16-ary secret digit into the pixel pair of the second shadow image. On average, this scheme provides an ER of up to 1.25 bpp, and its shadow images have considerable quality, with PSNRs of 49.38 dB and 45.55 dB, respectively. In order to increase the ER further, Xie et al. [23] used a newly-designed, turtle shell-based reference matrix to implement a high-capacity RDH scheme. Their scheme classifies a pixel pair duplicated from a pixel into an upper type or a lower type. According to the type of the pixel pair, a specific four × five block is selected, and this pixel pair is used as the bottom-right corner or the top-left corner so that each pixel pair can carry a 16-ary secret digit, thus, an ER of 2.0 bpp is obtained. However, in some cases, a large modification of the shadow images must be performed in order to avoid the problem of the location conflict. Thus, the visual quality of shadow images does not yield complete satisfaction, i.e., they have an average PSNR of 40.80 dB. In order to achieve good visual quality, Chen and Guo [24] presented a new RDH scheme based on fully exploiting the combination of the orientations of each pixel pair in the two shadow images. They took a pixel pair as a pivot point and drew a three × three block around it. Within this block, there were a total of 25 combinations of orientations that could uniquely determine the center pixel pair. They labelled those 25 orientation combinations from 0 to 24, with the assistance of a mark matrix. Thus, each orientation combination can be used to represent a 25-ary secret digit. As a result, the ER of scheme [24] is approximately 1.14 bpp, and the PSNR is around 49.92 dB. In 2021, Chen and Hong [25] exploited an improved EMD in order to implement the design of an RDH scheme for dual images without any overhead message. By this way, this scheme not only provides the better performance but also can resist some attacks.
Among those, Chen and Guo [24] presented a new RDH scheme based on fully exploiting the combination of the orientations and obtained an average ER of 1.14 bpp. In order to pursue a larger ER while keeping the amount of distortion as low as possible, in this paper, we propose a position-aware guided RDH scheme in dual images with the combination usage of the symmetric property and turtle shell. In our algorithm, first, a pixel pair is identified into four types, i.e., upper back element (UBE), lower back element (LBE), upper edge element (UEE), and lower edge element (LEE). Concerning one of the types, a specific sunflower flower area, consisting of seven (or four) neighbor turtle shells, is selected in order to create a series of position combinations, which make positive contributions to increasing the ER. Using the position combinations, we adaptively constructed an embedding table (ET) according to their respective loss values. While constructing the ET, if any pixel value inside a position combination exceeds the range [0, 255], it will be abandoned. This mechanism ensures that the problem of overflow will be avoided, so there is no overhead information required in this paper. Finally, according to the ET, each position combination represents the embedding of a secret digit to generate the shadow images. Extensive experimental results have proved that the proposed position-aware guided RDH scheme achieves a considerable ER, i.e., up to 1.25 bpp, while maintaining the good visual quality of the shadow images. In addition, three attacks, i.e., pixel value difference histogram, relative entropy, and regular singular analysis, were used in order to evaluate whether or not the proposed scheme can provide a secure, convert communication.
The rest of this paper is organized as follows. Section 2 reviews the related works. Section 3 introduces the proposed scheme. Experiments are given in Section 4, and Section 5 presents our conclusions.

2. Related Works

This section briefly states the turtle shell-based reference matrix [4], which is essential for the proposed scheme. The RDH scheme, which is a related, dual images scheme presented by Chen and Guo [24], is also reviewed in this section.

2.1. Turtle Shell-Based Reference Matrix

Over the past decade or so, a series of DH or RDH schemes were published that applied the idea of the turtle shell, and Chang et al.’s scheme [1] is a representative among those schemes. In Chang et al.’s work, a 256 × 256 reference matrix, i.e., where R, is constructed in advance according to the specific rule, as shown in Figure 1. It means that the reference matrix R is easy to regenerate, so it is not necessary to send it to the recipient.
Figure 1 shows that the reference matrix R is decomposed into a series of non-overlapping turtle shells. Each turtle shell covers eight distinct digits, ranging from 0 to 7. In view of the location of those digits, we can classify them into four types, i.e., UBE, LBE, UEE, and LEE. Without loss of generality, given a digit located at (x,y) in R, i.e., R(x,y), its type can be identified as follows:
Type   is   UBE   if   ( y   m o d   2 = 1   &   x   m o d   4 = 2 ) | | ( y   m o d   2 = 0   &   x   m o d   4 = 0 ) LBE   if   ( y   m o d   2 = 1   &   x   m o d   4 = 1 ) | | ( y   m o d   2 = 0   &   x   m o d   4 = 3 ) UEE   if   ( y   m o d   2 = 1   &   x   m o d   4 = 0 ) | | ( y   m o d   2 = 0   &   x   m o d   4 = 2 ) LEE   if   ( y   m o d   2 = 1   &   x   m o d   4 = 3 ) | | ( y   m o d   2 = 0   &   x   m o d   4 = 1 )
For example, R(4,4) belongs to UBE, as shown by the red circle in Figure 1, and R(3,5) belongs to LEE, as shown by the purple quadrangle in Figure 1.

2.2. Review of Chen and Guo’s Scheme

In 2020, Chen and Guo [24] proposed a dual-image-based RDH scheme in which each pixel pair ( x , y ) is processed to carry a 25-ary secret digit and produces two stego-pixel pairs, i.e., a primary pixel pair ( x p , y p ) and a foreign pixel pair ( x f , y f ) . In order to increase the embedding capacity and achieve a relatively high visual quality, this scheme fully exploits the combinations of pixel pair orientations.
Given a cover pixel pair ( x , y ) , they take the ( x , y ) as a pivot point and draw a three × three block, as shown in Figure 2a. They mark each location inside of the block to clarify their priority, as shown in Figure 2b. For reversibility, 25 combinations of orientations are utilized, and they can uniquely determine the center pixel pair ( x , y ) . Subsequently, those 25 combinations of orientations are ordered by their marks to adaptively construct the embedding table, as shown in Table 1. The combination of orientations that has a smaller primary mark is ordered ahead. If two of the combinations of orientations have the same primary marks, the one that has the smaller foreign mark has priority to be ordered ahead. Table 1 presents all of the 25 cases, and each one occupies a row, i.e., ( t , b t , ( x p t , y p t ) , ( x f t , y f t ) ) , which means to alter the cover pixel pair ( x , y ) to the stego-primary-pixel pairs ( x p t , y p t ) and the stego-foreign-pixel pair ( x f t , y f t ) and to embed a 25-ary secret digit, t, the binary representation of which is b t .

3. Proposed Scheme

In this section, we describe a position-aware guided RDH scheme based on turtle shell to insert the secret messages into a cover image by generating two shadow images. To begin with, the description of the position combinations in a sunflower area is given in Section 3.1. Then, the details of the shadow construction are introduced in Section 3.2. Section 3.3 illustrates the extraction of the secret messages and the recovery of the cover image. The overall flowchart of the proposed scheme is shown in Figure 3.

3.1. Position Combinations in a Sunflower Area

In a pixel-by-pixel manner, each two adjacent pixels, i.e., x and y, selected from the cover image, are grouped into a pixel pair ( x , y ) . Then, we take the x as the index of the x-axis and y as the index of the y-axis and project this information in the reference matrix R, thereby locating at R ( x , y ) . According to the location of R ( x , y ) , the sunflower area is determined as shown in the following four cases below:
Case 1: R ( x , y ) belongs to UBE. The sunflower area consists of seven turtle shells, and the value of the location of each element is shown in Figure 4a.
Case 2: R ( x , y ) belongs to LBE. The sunflower area consists of seven turtle shells, and the value of the location of each element is shown in Figure 4b.
Case 3: R ( x , y ) belongs to UEE. The sunflower area consists of four turtle shells, and the value of the location of each element is shown in Figure 5a.
Case 4: R ( x , y ) belongs to LEE. The sunflower area consists of four turtle shells, and the value of the location of each element is shown in Figure 5b.
After determining the sunflower area, we can embed a secret digit into the pixel pair in order to obtain two stego-pixel pairs, i.e., the primary pixel pair in shadow S1 and the foreign pixel pair in shadow S2. Concretely, to reversibility, the effective position combinations (EPCs) of the primary and foreign pixel pairs are exploited and can be generated by the rules that are described in Algorithm 1. To the best of our knowledge, there are 62 combinations of positions for Case 1 or Case 2 and 16 combinations of positions for Case 3 or Case 4 at most that can uniquely determine the cover pixel pair ( x , y ) . It is noted that, while generating the EPCs, any single pixel value inside a position combination that exceeds the range [0, 255] will be abandoned. Thus, it is certain that there will be a smaller number of combinations of positions in the corresponding EPC for the pixel pairs that are located in the boundary area. The advantage is that this mechanism ensures that the problem of overflow will be avoided, so no overhead information is required. It also implies that it is not required for the ET, that is derived adaptively from EPC, to be sent to the decoder.
Algorithm 1: Generation of effective position combinations for ( x , y )
Input: ( x , y ) , R
Output: Effective position combinations EPC
1EPC = ∅
2If R ( x , y ) belongs to UBE/LBE:
3Traverse each element R ( x , y ) in the sunflower area that corresponds to R ( x , y ) .
4If R ( x , y ) is inside R and belongs to UBE/LBE:
5Add the position combination ( ( x , y ) , ( x , y ) ) into EPC.
6Else, if R ( x , y ) is inside R and belongs to UEE/LEE:
7Add the position combinations ( ( x , y ) , ( x , y ) ) and ( ( x , y ) , ( x , y ) ) into EPC.
8End if
9Else if R ( x , y ) belongs to UEE/LEE
10Traverse each element R ( x , y ) in the sunflower area that corresponds to R ( x , y ) .
11If R ( x , y ) is inside R and belongs to UEE/LEE
12Add the position combination ( ( x , y ) , ( x , y ) ) into EPC
13End if
14End if
After generating EPC, ET can be constructed. For ease of illustration, we assume that EPC = { ( x p t , y p t ) , ( x f t , y f t ) } , where 0 t T 1 , and T is the number of combinations of positions in EPC. First, all of the position combinations in EPC are sorted in the ascending order of the loss value, l t . Among which, l t can be represented as follows:
l t = ( x p t x ) 2 + ( y p t y ) 2 + ( x f t x ) 2 + ( y f t y ) 2 ,
Then, we label those ordered position combinations arranging from 0 to T 1 . Table 2 and Table 3 show the detailed ETs for Case 1 and Case 3, respectively. Note that the ET of Case 2 (or Case 4) is similar to that of Case 1 (or Case 3).
Take Table 2 for example. For Case 1 (UBE), there is a total of 62 position combinations, and each occupies a row of a quaternion sequence, ( d t , ( x p t , x p t ) , ( x f t , x f t ) , l t ) , which indicates to modify the cover pixel pair ( x , y ) to the dual stego-pixel pairs, ( x p t , x p t ) and ( x f t , x f t ) , to carry a 62-ary secret digit, d t , under a total loss l t . Taking a specific case as an example, suppose that the cover pixel pair is (176, 70), which belongs to UBE, and it needs to carry a secret digit, i.e., 11. First, it is easy to find the row in Table 2, where d t = 11. Next, the pixel pair (176, 70) is modified to (175, 69) in the shadow S1, and it is (176, 70) in shadow S2. Finally, the secret digit, 11, is carried.

3.2. Shadow Construction

Assume that we want to embed the secret messages, i.e., Msg, into a grayscale cover image, C, with a size of H × W in order to generate two shadow images, S1 and S2. The detailed construction of the shadow images is described in Algorithm 2.
Algorithm 2: Construction of the shadow images
Input:C, Msg, R
Output:S1, S2
1Separate C into a set of non-overlapping pixel pairs in order from top to bottom, left to right, and denoted as C = { ( x n , y n ) } , where 1 n N and N = H · W 2 .
2Read an unvisited pixel pair ( x n , y n ) from C and project it into the reference matrix R, i.e., R ( x n , y n ) .
3Identify R ( x n , y n ) ’s type into one of {UBE, LBE, UEE, LEE} according to Equation (1).
4Use Algorithm 1 to generate EPC for R ( x n , y n ) and then construct the corresponding ET.
5Convert Msg into a T -ary numeral system to derive a T -ary secret digit, θ .
6Use ET to embed θ into ( x n , y n ) :
6.1Find the quaternion sequence ( d t , ( x p t , y p t ) , ( x f t , y f t ) , l t ) in ET where t = θ .
6.2Modify two pixel pairs, i.e., ( x S 1 n , y S 1 n ) = ( x p θ , y p θ ) in shadow S1 and ( x S 2 n , y S 2 n ) = ( x f θ , y f θ ) in shadow S2.
7Repeat Steps 2 through 7 until all cover pixel pairs and secret message Msg have been dealt with.
8Output two shadow images, i.e., S1 and S2.
After the two shadow images S1 and S2 have been generated, we send shadow image S1 to one recipient and send shadow image S2 to another recipient.

3.3. Extraction of Secret Messages and Recovery of the Cover Image

Retrieving the secret messages, Msg, and restoring the cover image, C, can be accomplished only if both of the recipients release their own shadow image. The details of extracting secret messages, Msg, and restoring image C, are described in Algorithm 3.
Algorithm 3: Extracting secret messages, Msg, and restoring the cover image, C
Input: S1, S2, R
Output: Msg, C
1Separate shadow images S1 and S2 into a set of non-overlapping pixel pairs in order from top to bottom and from left to right, respectively. To ease the discussion, denote S1 as { ( x S 1 n , y S 1 n ) } and S2 as { ( x S 2 n , y S 2 n ) } , where 1 n N and N = H · W 2 .
2Read a couple of pixel pairs ( x S 1 n , y S 1 n ) and ( x S 2 n , y S 2 n ) and restore the original cover pixel pair ( x n , y n ) as shown below:
2.1Project ( x S 1 n , y S 1 n ) and ( x S 2 n , y S 2 n ) into R, i.e., R ( x S 1 n , y S 1 n ) and R ( x S 2 n , y S 2 n ) .
2.2If R ( x S 1 n , y S 1 n ) belongs to UBE/LBE, set ( x n , y n ) = ( x S 1 n , y S 1 n ) .
2.3If R ( x S 1 n , y S 1 n ) belongs to UEE/LEE, then:
2.3.1If R ( x S 2 n , y S 2 n ) belongs to UBE/LBE, set ( x n , y n ) = ( x S 2 n , y S 2 n ) ;
2.3.2Else set ( x n , y n ) = ( x S 1 n , y S 1 n ) .
3Project ( x n , y n ) into R, i.e., R ( x n , y n ) .
4Identify the type of R ( x n , y n ) as one of {UBE, LBE, UEE, LEE} according to Equation (1).
5Use Algorithm 1 to generate EPC for R ( x n , y n ) and construct the corresponding ET.
6Use ET to extract a secret digit, θ , from ( x S 1 n , y S 1 n ) and ( x S 2 n , y S 2 n ) :
6.1Find the quaternion sequence ( d t , ( x p t , x p t ) , ( x f t , x f t ) , l t ) in ET to meet ( x p t , x p t ) = ( x S 1 n , x S 1 n ) and ( x f t , x f t ) = ( x S 2 n , x S 2 n ) .
6.2Extract θ = d t .
7Convert θ in a T -ary inverse numeral system to derive the sequence of the binary codes and concatenate it into Msg.
8Repeat Steps 2 through 8 until all pixel pairs have been processed.
9Output Msg and restore cover image C.

4. Experiments

In order to demonstrate the effectiveness of our approach, in this section we present and discuss the simulation results of the proposed scheme and other dual-image-based RDH schemes [17,19,22,23,24]. All of the experiments were performed under MATLAB R2019b on a personal computer with an Intel® Core™ i5-1035G1 CPU @1.00GHz 1.19GHz, 16 GB RAM, and a Windows 10 operating system. In the following experiments, eight commonly used grayscale images with sizes of 512 × 512 (i.e., Lena, Airplane, Peppers, Baboon, Goldhill, Elaine, Barbara, and Wine) were downloaded from the USC-SIPI image database and used as test images, as listed in Figure 6.
In order to evaluate the secrecy of the hidden data offered by the generated shadow images, the image distortion between the cover image C and the generated shadow image S (i.e., S1 or S2) was measured using the peak signal-to-noise ratio (PSNR) [26], and it can be represented as follows:
P S N R = 10 log 10 ( 255 2 M S E ) ,
M S E = 1 H · W i = 1 H j = 1 W ( C i , j S i , j ) 2 ,
where C i , j and S i , j represent the pixel values located at the ith row and jth column in images C and S (i.e., S1 or S2), respectively. In general, the larger the PSNR value is, the better the quality of the shadow image will be.
In addition to PSNR, ER provides an objective metric for the evaluation of the embedding capacity, and ER is computed as follows:
E R = L B 2 · H · W ,
where L B represents all of the embedded secret messages. In our experiment, both H and W are equal to 512.

4.1. Security Analysis

In order to prove that the proposed scheme can provide a secure, covert communication, security analyses, such as pixel value difference (PVD) histogram [3], relative entropy (RE) analysis, and regular-singular (RS) steganalysis [24], are evaluated experimentally in this section.

4.1.1. PVD Histogram

Usually, a general image is considered to have the feature of local smoothness, so the difference between two neighboring pixels is very likely to be slight. Subsequently, the PVD histogram is created by gathering the frequencies of these differences, and its shape will be a Laplace distribution. If a shadow image is distorted seriously, the shape of its PVD histogram will be very different from that of its original PVD histogram. Figure 6 demonstrates the PVD histograms of four cover images and their corresponding shadows. Figure 7 shows that the shape of each cover PVD histogram is well preserved on the two shadows.

4.1.2. Relative Entropy Analysis

Also, we analyzed the performance of the proposed scheme in terms of the relative entropy, which is used to measure the divergence of the shadow image S (i.e., S1/S2) from the cover image (C). The relative entropy can be represented mathematically as follows:
R E ( C , S ) = z = 0 255 C ( z ) · l o g ( C ( z ) S ( z ) ) ,
where C ( z ) and S ( z ) represent the probability distributions of the pixel values for images C and S (i.e., S1/S2), respectively. When the value of RE approaches 0, it is considered that these two images are nearly coincident, meaning that the system is more secure. Table 4 elaborates the results of RE among the cover image and the two shadow images and it shows that the entropies of all of the images are very close to having the same values, and the REs also are near zero. This implies that our approach is quite secure.

4.1.3. RS Steganalysis

In addition to the PVD histogram and the RE analysis, the RS steganalysis [27,28] is introduced in order to identify whether or not an image carries secret messages by detecting the degree of LSB modifications.
For any two shadows, we divide them into several non-overlapping blocks with four consecutive pixels, and we classify them into three categories, i.e., regular type ( R M   or   R M ) , singular type ( S M   or   S M ) , and the unchanged type ( U ) . Here, M is a mask, and it is defined as [1 0 1 0]. R M   and   R M represent the percentages of the regular blocks when the flipping function with M and the shifting function with −M are applied, respectively. Similarly, S M   and   S M represent the percentages of the singular blocks when the flipping function with M and the shifting function with −M are applied, respectively. If an algorithm deployed on an image can defend against RS steganalysis, the relationship derived from the stego-image should meet Equation (7).
R M R M   and   S M S M .
Figure 8 depicts the graphs of the RS steganalysis for the four shadow images that were generated from the Lena and Baboon images. Figure 8 indicates that every shadow of the two test images follows Equation (7), indicating that our approach is robust for defending against the RS steganalysis.

4.2. Results of the Proposed Scheme

Table 5 lists the experimental results in terms of the ER and PSNR/SSIM values of the two shadow images provided by the proposed scheme. It is not surprising that the PSNR values of the images decrease as ER increases, since more secret messages were carried. Moreover, the SSIM values of each shadow image are higher than 0.9900, indicating the high structure similarity between the cover and shadow images. Also, it can be seen from Table 5 that the proposed scheme achieves a high ER with a value of 1.25 bpp, and the average PSNR values of shadow images S1 and S2 are 49.46 dB and 44.49 dB, respectively. Obviously, the PSNR values provided by our approach are significantly larger than 30 dB, which implies that the human vision system has difficulty identifying the shadow images from the corresponding cover image.

4.3. Comparison and Analysis

In order to further prove the excellent performance of the proposed scheme, we compared the results provided by the proposed scheme with the results provided by some relevant works, including Chang et al.’s scheme [17], Lee and Huang’s scheme [19], Lin et al.’s scheme [22], Xie et al.’s scheme [23], Chen and Guo’s scheme [24], and Chen and Hong’s scheme [25].
First, we compared the maximum ER provided by various schemes [17,19,22,23,24,25] and our approach, all of which are RDH schemes in dual images. The results are shown in Table 6, and they show that the average maximum ER provided by the proposed scheme is identical to that of Lin et al.’s scheme [22]. However, it is higher than other three schemes [17,19,24] with differences of 0.25 bpp, 0.21 bpp, and 0.11 bpp, respectively. This means that our approach has the ability to carry more secret messages. Also, Xie et al.’s scheme [23] and Chen and Hong’s scheme [25] achieved the greater ERs of 2.0 bpp and 1.56 bpp, respectively, which is better than our approach and Lin et al.’s scheme [22]. However, all of their PSNR values of two shadow images were only 40.80 dB and 43.43 dB on average, as shown in Table 7. That is mainly because some pixels have to be shifted into a larger area in order to avoid the location conflict problem during the embedding of the secret messages. Concerning the quality of the image, both our approach and schemes of Lee and Huang’s [19] and Lin et al.’s [22] have their merits and their downsides. Our approach provides a higher PSNR value than the other two approaches for shadow image S1, but it provided a lower PSNR value of shadow image S2. Obviously, Chen and Guo’s scheme [24] has a better PSNR value than our approach. The main reason is that they carried a smaller amount of secret message than ours. Moreover, they constructed orientation combinations in a three × three square block, while our approach generates position combinations in a turtle shell-based sunflower area. Conversely, our approach achieves a higher ER when compared to Chen and Guo’s scheme [24]. Thus, it is clear that there is always a trade-off between the quality of the image and the embedding capacity.
In order to obtain a fair comparison, Table 8 demonstrates a comparison of PSNRs among the different schemes under the same ER = 1.25 bpp. As can be seen, our approach and Lin et al.’s scheme [22] provide a better PSNR compared to Chen and Hong’s scheme [25]. Furthermore, Figure 9 demonstrates the ER–PSNR curves of shadow images between our approach and schemes [17,19,22,23]. The left column in Figure 9 indicates that our approach always achieved higher PNSR values than the other schemes when ER varied from 0.2 bpp to 1.25 bpp. Similarly, we can see from the right column in Figure 9 that the PSNR value of our approach is the third, after Lee and Huang’s scheme [19] and Lin et al.’s scheme [22], when the same ER is set. In summary, our approach is an excellent scheme that obtains both a higher ER and a higher PSNR, as Lin et al.’s scheme achieved. However, no confusion occurs by referring EPC, which is built up based on our Algorithm 1. It means the extraction and recovery procedure is relatively more efficient than that of Lin et al.’s scheme.
Finally, we have given the comparisons in term of the execution times between our approach and some related works [17,19,22,23,25]. The results are listed in Table 9. Therein, each statistical value is a mean of 10 experimental results. As to our approach, on average, the execution time is around 0.5522 s, which means that our approach is more efficient. Moreover, it is obvious to find that those systems are capable of implementing experiments in less than 1s, indicating that they can be applied in most real-time scenarios.

4.4. Discussions

The above experiments have confirmed that our approach has a good ER, while keeping the image distortion as low as possible. Nevertheless, we provide some discussions to guide the future improvements, in terms of the limited capabilities and the potential failures.

4.4.1. Limited Capabilities Analysis

  • The to-be-embedded secret messages, i.e., Msg, are too large. The larger the Msg is, the larger the sunflower area should be. In doing so, the visual quality of shadow images will be seriously distorted. This indicates that the system is not capable of keeping the trade-off between PSNR and ER;
  • Cost of execution time. In order to construct the ET adaptively, both in data embedding and extraction stages, each pixel pair should determine the sunflower area and select the EPCs according to their types. This requires the additional cost of execution time.

4.4.2. Potential Failures Analysis

  • Without the prior knowledge of the rule of constructing EPC and ET, in this case, the receiver cannot extract the secret messages or carry out image recovery;
  • Only owning one shadow image. In this paper, the secret messages and image recovery was correctly performed only if both of the recipients release their own shadow image. Therefore, for any one receiver alone, there will be a failure to extract the hidden secret messages.

5. Conclusions

In this paper, we presented an effective RDH scheme based on a turtle shell-based reference matrix and a position-aware strategy in order to achieve shadow images that had considerable quality, as well as a higher embedding capacity. First, a sunflower area based on turtle shell was designed, and then the corresponding embedding table was constructed by fully considering the combinations of positions. Using an embedding table, each pixel pair is used to carry the specific secret messages in order to generate two shadows. Due to the flexible and adaptive position combination strategy, we can process our system without any overhead information. As a consequence, an ER value of 1.25 bpp was obtained while the visual quality of the shadow images was maintained at around 49.46 dB. The experimental results confirmed that our approach outperformed some of the relevant works, in terms of both embedding capacity and image quality. In addition, we conducted security analyses in order to prove that our approach is effective against attacks on the PVD, RE, and RS analyses.
Due the reversibility and high capacity, our system can be used to develop a software on WeChat, etc., which aims to transmit the personal data. In the future, we will explore the novel strategy in order to solve the potential failures in our system. Also, we will try to investigate more applications by using our algorithm, such as image watermarking, image ownership verification, and intellectual property protection.

Author Contributions

Conceptualization, C.-C.C. and C.-C.L.; methodology, G.-D.S. and C.-C.L.; software, G.-D.S.; validation, G.-D.S. and C.-C.L.; formal analysis, Y.-H.L.; investigation, G.-D.S. and C.-C.L.; writing—original draft preparation, G.-D.S. and C.-C.L.; writing, C.-C.C., G.-D.S. and C.-C.L.; visualization, G.-D.S.; supervision, C.-C.C., Y.-H.L. and C.-C.L.; project administration, Y.-H.L.; funding acquisition, Y.-H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Hon Hai Research Institute, Foxconn Technology Group.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The source code will be provided as requested.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chang, C.C.; Liu, Y.; Nguyen, T.S. A novel turtle shell based scheme for data hiding. In Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 27–29 August 2014; pp. 89–93. [Google Scholar]
  2. Duan, X.; Li, B.; Xie, Z.; Yue, D.; Ma, Y. High-capacity information hiding based on residual network. IETE Tech. Rev. 2021, 38, 172–183. [Google Scholar] [CrossRef]
  3. Ge, X.; Yu, J.; Hao, R.; Lv, H. Verifiable Keyword search supporting sensitive information hiding for the cloud-based healthcare sharing system. IEEE Trans. Ind. Inform. 2021. [Google Scholar] [CrossRef]
  4. Chang, C.C.; Li, C.T.; Shi, Y.Q. Privacy-aware reversible watermarking in cloud computing environments. IEEE Access 2018, 6, 70720–70733. [Google Scholar] [CrossRef]
  5. Chang, C.C. Adversarial learning for invertible steganography. IEEE Access 2020, 8, 198425–198435. [Google Scholar] [CrossRef]
  6. Chang, C.C.; Li, C.T.; Chen, K. Privacy-preserving reversible information hiding based on arithmetic of quadratic residues. IEEE Access 2019, 7, 54117–54132. [Google Scholar] [CrossRef]
  7. Hu, Y.; Lee, H.K.; Chen, K.; Li, J. Difference expansion based reversible data hiding using two embedding directions. IEEE Trans. Multimed. 2008, 10, 1500–1512. [Google Scholar] [CrossRef]
  8. Lee, C.F.; Chen, H.L.; Tso, H.K. Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J. Syst. Softw. 2010, 83, 1864–1872. [Google Scholar] [CrossRef]
  9. Ou, B.; Li, X.; Zhao, Y.; Ni, R.; Shi, Y.Q. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 2013, 22, 5010–5021. [Google Scholar] [CrossRef]
  10. Chang, Q.; Li, X.; Zhao, Y.; Ni, R. Adaptive pairwise prediction-error expansion and multiple histograms modification for reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 4850–4863. [Google Scholar] [CrossRef]
  11. Wang, J.; Ni, J.; Zhang, X.; Shi, Y.Q. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybern. 2016, 47, 315–326. [Google Scholar] [CrossRef]
  12. Peng, F.; Zhao, Y.; Zhang, X.; Long, M.; Pan, W.Q. Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process. Image Commun. 2020, 81, 115715. [Google Scholar] [CrossRef]
  13. Qu, X.; Kim, H.J. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 2015, 111, 249–260. [Google Scholar] [CrossRef]
  14. Chang, J.; Ding, F.; Li, X.; Zhu, G. Hybrid prediction-based pixel-value-ordering method for reversible data hiding. J. Vis. Commun. Image Represent. 2021, 77, 103097. [Google Scholar] [CrossRef]
  15. Chang, C.C. Cryptospace invertible steganography with conditional generative adversarial networks. Secur. Commun. Netw. 2021, 2021, 5538720. [Google Scholar] [CrossRef] [PubMed]
  16. Chang, C.C. Neural reversible steganography with long short-term memory. Secur. Commun. Netw. 2021, 2021, 5580272. [Google Scholar] [CrossRef]
  17. Chang, C.C.; Kieu, T.D.; Chou, Y.C. Reversible data hiding scheme using two steganographic images. In Proceedings of the Tencon 2007–IEEE Region 10 Conference, Taipei, Taiwan, 30 October–2 November 2007; pp. 1–4. [Google Scholar]
  18. Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A reversible data hiding scheme based on dual steganographic images. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 15–16 January 2009; pp. 228–237. [Google Scholar]
  19. Lee, C.F.; Huang, Y.L. Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 2013, 52, 2237–2247. [Google Scholar] [CrossRef]
  20. Liu, Y.; Chang, C.C. A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed. Tools Appl. 2018, 77, 25295–25310. [Google Scholar] [CrossRef]
  21. Su, G.D.; Liu, Y.; Chang, C.C. A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images. J. Vis. Commun. Image Represent. 2019, 64, 102618. [Google Scholar] [CrossRef]
  22. Lin, J.Y.; Liu, Y.; Chang, C.C. A real-time dual-image-based reversible data hiding scheme using turtle shells. J. Real-Time Image Process. 2019, 16, 673–684. [Google Scholar] [CrossRef]
  23. Xie, X.Z.; Chang, C.C. Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility. Multimed. Tools Appl. 2021, 80, 36567–36584. [Google Scholar] [CrossRef]
  24. Chen, X.; Guo, W. Reversible data hiding scheme based on fully exploiting the orientation combinations of dual stego-images. Int. J. Netw. Secur. 2020, 22, 126–135. [Google Scholar]
  25. Chen, X.; Hong, C. An efficient dual-image reversible data hiding scheme based on exploiting modification direction. J. Inf. Secur. Appl. 2021, 58, 102702. [Google Scholar] [CrossRef]
  26. Chang, C.C.; Li, C.T. Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Math. Biosci. Eng. 2019, 16, 3367–3381. [Google Scholar] [CrossRef] [PubMed]
  27. Fridrich, J.; Goljan, M.; Du, R. Detecting LSB steganography in color, and gray-scale images. IEEE Multimed. 2001, 8, 22–28. [Google Scholar] [CrossRef] [Green Version]
  28. Lou, D.C.; Hu, C.H. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 2012, 188, 346–358. [Google Scholar] [CrossRef]
Figure 1. Part of the reference matrix.
Figure 1. Part of the reference matrix.
Symmetry 14 00509 g001
Figure 2. Definition of a 3 × 3 block. (a) The value of each location in a 3 × 3 block, (b) mark matrix.
Figure 2. Definition of a 3 × 3 block. (a) The value of each location in a 3 × 3 block, (b) mark matrix.
Symmetry 14 00509 g002
Figure 3. The overall flowchart of the proposed scheme.
Figure 3. The overall flowchart of the proposed scheme.
Symmetry 14 00509 g003
Figure 4. The value of each element’s location in the sunflower area for (a) UBE, (b) LBE.
Figure 4. The value of each element’s location in the sunflower area for (a) UBE, (b) LBE.
Symmetry 14 00509 g004
Figure 5. The value of each element’s location in the sunflower area for (a) UEE, (b) LEE.
Figure 5. The value of each element’s location in the sunflower area for (a) UEE, (b) LEE.
Symmetry 14 00509 g005
Figure 6. Eight test images: (a) Lena, (b) Elaine, (c) Barbara, (d) Airplane, (e) Baboon, (f) Goldhill, (g) Peppers, and (h) Wine.
Figure 6. Eight test images: (a) Lena, (b) Elaine, (c) Barbara, (d) Airplane, (e) Baboon, (f) Goldhill, (g) Peppers, and (h) Wine.
Symmetry 14 00509 g006
Figure 7. Four PVD histograms of the cover images and the corresponding shadows: (a) Baboon, (b) Barbara, (c) Lena, and (d) Peppers.
Figure 7. Four PVD histograms of the cover images and the corresponding shadows: (a) Baboon, (b) Barbara, (c) Lena, and (d) Peppers.
Symmetry 14 00509 g007
Figure 8. Graphs of RS steganalysis for shadow images: (a) Shadow S1 for Lena, (b) Shadow S2 for Lena, (c) Shadow S1 for Baboon, and (d) Shadow S2 for Baboon.
Figure 8. Graphs of RS steganalysis for shadow images: (a) Shadow S1 for Lena, (b) Shadow S2 for Lena, (c) Shadow S1 for Baboon, and (d) Shadow S2 for Baboon.
Symmetry 14 00509 g008aSymmetry 14 00509 g008b
Figure 9. Comparisons various ERs and PSNRs among the different schemes: (a) Shadow S1 for Lena, (b) Shadow S2 for Lena, (c) Shadow S1 for Peppers, (d) Shadow S2 for Peppers, (e) Shadow S1 for Barbara, (f) Shadow S2 for Barbara, (g) Shadow S1 for Baboon, and (h) Shadow S2 for Baboon.
Figure 9. Comparisons various ERs and PSNRs among the different schemes: (a) Shadow S1 for Lena, (b) Shadow S2 for Lena, (c) Shadow S1 for Peppers, (d) Shadow S2 for Peppers, (e) Shadow S1 for Barbara, (f) Shadow S2 for Barbara, (g) Shadow S1 for Baboon, and (h) Shadow S2 for Baboon.
Symmetry 14 00509 g009aSymmetry 14 00509 g009b
Table 1. Embedding rules of Chen and Guo’s scheme [24].
Table 1. Embedding rules of Chen and Guo’s scheme [24].
t b t ( x p t , y p t ) Primary Mark ( x f t , y f t ) Foreign Mark
000000 ( x , y ) 0 ( x , y ) 0
100001 ( x , y + 1 ) 1
200010 ( x + 1 , y ) 2
300011 ( x , y 1 ) 3
400100 ( x 1 , y ) 4
500101 ( x + 1 , y + 1 ) 5
600110 ( x + 1 , y 1 ) 6
700111 ( x 1 , y 1 ) 7
801000 ( x 1 , y + 1 ) 8
901001 ( x , y + 1 ) 1 ( x , y 1 ) 3
1001010 ( x + 1 , y 1 ) 6
1101011 ( x 1 , y 1 ) 7
1201100 ( x + 1 , y ) 2 ( x 1 , y ) 4
1301101 ( x 1 , y 1 ) 7
1401110 ( x 1 , y + 1 ) 8
1501111 ( x , y 1 ) 3 ( x 1 , y + 1 ) 1
1610000 ( x + 1 , y + 1 ) 5
1710001 ( x , y + 1 ) 8
181001 ( x 1 , y ) 4 ( x + 1 , y ) 2
191010 ( x + 1 , y 1 ) 5
201011 ( x + 1 , y + 1 ) 6
211100 ( x + 1 , y + 1 ) 5 ( x 1 , y 1 ) 7
221101 ( x + 1 , y 1 ) 6 ( x 1 , y + 1 ) 8
231110 ( x 1 , y 1 ) 7 ( x + 1 , y + 1 ) 5
241111 ( x 1 , y + 1 ) 8 ( x + 1 , y 1 ) 6
Table 2. Embedding table for Case 1 (UBE).
Table 2. Embedding table for Case 1 (UBE).
d t ( x p t , y p t ) , ( x f t , y f t ) l t d t ( x p t , y p t ) , ( x f t , y f t ) l t d t ( x p t , y p t ) , ( x f t , y f t ) l t
0 ( x , y ) , ( x , y ) 021 ( x + 1 , y 2 ) , ( x , y ) 542 ( x , y ) , ( x 3 , y ) 9
1 ( x , y ) , ( x , y 1 ) 122 ( x , y ) , ( x + 1 , y + 2 ) 543 ( x 3 , y ) , ( x , y ) 9
2 ( x , y 1 ) , ( x , y ) 123 ( x + 1 , y + 2 ) , ( x , y ) 544 ( x , y ) , ( x + 3 , y 1 ) 10
3 ( x , y ) , ( x , y + 1 ) 124 ( x , y ) , ( x + 2 , y 1 ) 545 ( x + 3 , y 1 ) , ( x , y ) 10
4 ( x , y + 1 ) , ( x , y ) 125 ( x , y ) , ( x + 2 , y + 1 ) 546 ( x , y ) , ( x + 3 , y + 1 ) 10
5 ( x , y ) , ( x + 1 , y ) 126 ( x , y ) , ( x 1 , y 2 ) 547 ( x + 3 , y + 1 ) , ( x , y ) 10
6 ( x + 1 , y ) , ( x , y ) 127 ( x , y ) , ( x 1 , y + 2 ) 548 ( x , y ) , ( x 1 , y 3 ) 10
7 ( x , y ) , ( x 1 , y ) 128 ( x , y ) , ( x 2 , y 1 ) 549 ( x 1 , y 3 ) , ( x , y ) 10
8 ( x , y ) , ( x + 1 , y 1 ) 229 ( x , y ) , ( x 2 , y + 1 ) 550 ( x , y ) , ( x 1 , y + 3 ) 10
9 ( x , y ) , ( x + 1 , y + 1 ) 230 ( x , y ) , ( x + 2 , y 2 ) 851 ( x 1 , y + 3 ) , ( x , y ) 10
10 ( x , y ) , ( x 1 , y 1 ) 231 ( x + 2 , y 2 ) , ( x , y ) 852 ( x , y ) , ( x 3 , y 1 ) 10
11 ( x 1 , y 1 ) , ( x , y ) 232 ( x , y ) , ( x + 2 , y + 2 ) 853 ( x , y ) , ( x 3 , y + 1 ) 10
12 ( x , y ) , ( x 1 , y + 1 ) 233 ( x + 2 , y + 2 ) , ( x , y ) 854 ( x , y ) , ( x 3 , y 2 ) 13
13 ( x 1 , y + 1 ) , ( x , y ) 234 ( x , y ) , ( x 2 , y 2 ) 855 ( x 3 , y 2 ) , ( x , y ) 13
14 ( x , y ) , ( x + 2 , y ) 435 ( x 2 , y 2 ) , ( x , y ) 856 ( x , y ) , ( x 3 , y + 2 ) 13
15 ( x + 2 , y ) , ( x , y ) 436 ( x , y ) , ( x 2 , y + 2 ) 857 ( x 3 , y + 2 ) , ( x , y ) 13
16 ( x , y ) , ( x , y 2 ) 437 ( x 2 , y + 2 ) , ( x , y ) 858 ( x , y ) , ( x 4 , y 1 ) 17
17 ( x , y ) , ( x , y + 2 ) 438 ( x , y ) , ( x , y 3 ) 959 ( x 4 , y 1 ) , ( x , y ) 17
18 ( x , y ) , ( x 2 , y ) 439 ( x , y 3 ) , ( x , y ) 960 ( x , y ) , ( x 4 , y + 1 ) 17
19 ( x 2 , y ) , ( x , y ) 440 ( x , y ) , ( x , y + 3 ) 961 ( x 4 , y + 1 ) , ( x , y ) 17
20 ( x , y ) , ( x + 1 , y 2 ) 541 ( x , y + 3 ) , ( x , y )
d t : The t-th to-be-embedded secret digit; l t : The loss value if d t is embedded; ( x p t , y p t ) : The stego-primary-pixel pair after embedding d t ; ( x f t , y f t ) : The stego-foreign-pixel pair after embedding d t .
Table 3. Embedding table for Case 3 (UEE).
Table 3. Embedding table for Case 3 (UEE).
d t ( x p t , y p t ) , ( x f t , y f t ) l t d t ( x p t , y p t ) , ( x f t , y f t ) l t
0 ( x , y ) , ( x , y ) 08 ( x , y ) , ( x + 2 , y 1 ) 5
1 ( x , y ) , ( x 1 , y ) 19 ( x , y ) , ( x 2 , y + 1 ) 5
2 ( x , y ) , ( x + 1 , y 1 ) 210 ( x , y ) , ( x 1 , y + 2 ) 5
3 ( x , y ) , ( x + 1 , y + 1 ) 211 ( x , y ) , ( x + 2 , y + 1 ) 5
4 ( x , y ) , ( x , y 2 ) 412 ( x , y ) , ( x + 3 , y ) 9
5 ( x , y ) , ( x , y + 2 ) 413 ( x , y ) , ( x 3 , y + 1 ) 10
6 ( x , y ) , ( x 1 , y 2 ) 514 ( x , y ) , ( x 3 , y 1 ) 10
7 ( x , y ) , ( x 2 , y 1 ) 515 ( x , y ) , ( x 4 , y ) 16
Table 4. Entropy and relative entropy among C, S1, and S2.
Table 4. Entropy and relative entropy among C, S1, and S2.
Test ImagesEntropyRelative Entropy
CS1S2(C, S1)(C, S2)(S1, S2)
Airplane6.70596.71296.72860.00070.00540.0039
Baboon7.13917.14047.14250.00030.00080.0009
Goldhill7.47787.48117.48690.00060.00330.0024
Barbara7.63217.63417.63770.00020.00140.0013
Elaine7.49807.49917.50110.00030.00120.0012
Lena7.44557.44777.45130.00030.00110.0011
Peppers7.59447.59647.60060.00020.00160.0016
Wine7.46497.46817.47470.00100.00380.0043
Average7.36977.37257.37790.00040.00230.0021
Table 5. PSNRs/SSIMs under different ERs in the proposed scheme.
Table 5. PSNRs/SSIMs under different ERs in the proposed scheme.
Test ImagesERPSNR/SSIM
(S1)
PSNR/SSIM
(S2)
ERPSNR/SSIM
(S1)
PSNR/SSIM
(S2)
ERPSNR/SSIM
(S1)
PSNR/SSIM
(S2)
Airplane0.2057.38/0.999752.47/0.9992 1.0050.41/0.998945.47/0.99651.2549.44/0.998644.49/0.9957
Baboon0.2057.38/1.000052.48/0.99991.0050.42/0.999645.460.99861.2549.46/0.999444.49/0.9983
Goldhill0.2057.42/0.999852.44/0.99941.0050.39/0.999445.470.99811.2549.44/0.999244.500.9976
Barbara0.2057.38/0.999952.48/0.99961.0050.42/0.999445.47/0.99811.2549.450.999244.50/0.9976
Elaine0.2057.42/0.999852.44/0.99941.0050.45/0.999145.45/0.99721.2549.49/0.998944.48/0.9966
Lena0.2057.33/0.999752.47/0.9991 1.0050.39/0.999045.47/0.99691.2549.43/0.998844.50/0.9963
Peppers0.2057.47/0.999852.45/0.99941.0050.45/0.999045.45/0.99701.2549.48/0.998844.48/0.9963
Wine0.2057.39/0.999952.44/0.99951.0050.430.999145.460.99731.2549.47/0.998844.50/0.9964
Average0.2057.40/0.999852.46/0.99941.0050.42/0.999245.46/0.99751.2549.46/0.999044.49/0.9968
Table 6. Comparisons of maximum ER (bpp) among the different schemes.
Table 6. Comparisons of maximum ER (bpp) among the different schemes.
Test ImagesChang et al. [17]Lee and Huang [19]Lin et al.
[22]
Xie et al.
[23]
Chen and Guo [24]Chen and Hong [25]Proposed Scheme
Airplane1.001.041.252.001.141.561.25
Baboon1.001.041.252.001.141.561.25
Goldhill1.001.041.252.001.141.561.25
Barbara1.001.041.252.001.141.561.25
Elaine1.001.041.252.001.141.561.25
Lena1.001.041.252.001.141.561.25
Peppers1.001.041.252.001.141.561.25
Wine1.001.041.252.001.141.561.25
Average1.001.041.252.001.141.561.25
Table 7. Comparisons of PSNR (dB) with maximum ER among the different schemes.
Table 7. Comparisons of PSNR (dB) with maximum ER among the different schemes.
Test
Images
Chang et al. [17]Lee and Huang [19]Lin et al.
[22]
Xie et al.
[23]
Chen and Guo
[24]
Chen and Hong [25]Proposed
Scheme
S1S2S1S2S1S2S1S2S1S2S1S2S1S2
Airplane45.3245.3449.3849.3849.3945.5440.8040.8149.9149.9243.4043.4549.4444.49
Baboon45.3445.3449.3849.3849.3845.5540.8040.7849.9149.9243.3943.4249.4644.49
Goldhill45.3545.3449.3849.3849.3845.5540.7940.7949.9149.9243.3943.4349.4444.50
Barbara45.3245.3249.3849.3849.3945.5540.7940.7849.9149.9243.4243.4449.4544.50
Elaine45.3345.3449.3849.3849.3845.5540.7940.7949.9149.9243.4043.4349.4944.48
Lena45.3245.3249.3849.3849.3845.5440.8040.8049.9149.9243.4143.4149.4344.50
Peppers45.3245.3549.3849.3849.3845.5540.8040.8049.9149.9243.4243.4149.4844.48
Wine45.3345.3449.3849.3849.3845.5540.8040.8049.9149.9243.4143.4249.4744.50
Average45.3345.3349.3849.3849.3845.5540.8040.8049.9149.9243.4043.4349.4644.49
Table 8. Comparisons of PSNR (dB) among the different schemes under ER = 1.25 bpp.
Table 8. Comparisons of PSNR (dB) among the different schemes under ER = 1.25 bpp.
Test
Images
Lin et al.
[22]
Chen and Hong
[25]
Proposed
Scheme
S1S2S1S2S1S2
Airplane49.3945.5444.3644.4149.4444.49
Baboon49.3845.5544.3444.3849.4644.49
Goldhill49.3845.5544.3544.4049.4444.50
Barbara49.3945.5544.3844.4049.4544.50
Elaine49.3845.5544.3744.4049.4944.48
Lena49.3845.5444.3744.3849.4344.50
Peppers49.3845.5544.3944.3749.4844.48
Wine49.3845.5544.3744.3949.4744.50
Average49.3845.5544.3744.3949.4644.49
Table 9. Comparisons of execution time (s) among the different schemes.
Table 9. Comparisons of execution time (s) among the different schemes.
Test ImagesChang et al. [17]Lee and Huang [19]Lin et al.
[22]
Xie et al.
[23]
Chen and Hong [25]Proposed Scheme
Airplane0.05330.75500.04450.13200.08000.5217
Baboon0.05430.76550.05110.12030.07810.5230
Goldhill0.05570.74750.04580.11980.06090.4869
Barbara0.05300.74580.04930.11960.06050.5118
Elaine0.05270.74290.04610.12130.06000.5338
Lena0.05270.73270.04590.12050.05970.5036
Peppers0.05230.73590.04590.11990.06600.5479
Wine0.05660.75810.04320.12210.07200.5485
Average0.05380.74790.04650.12190.06720.5222
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chang, C.-C.; Su, G.-D.; Lin, C.-C.; Li, Y.-H. Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry 2022, 14, 509. https://doi.org/10.3390/sym14030509

AMA Style

Chang C-C, Su G-D, Lin C-C, Li Y-H. Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry. 2022; 14(3):509. https://doi.org/10.3390/sym14030509

Chicago/Turabian Style

Chang, Chin-Chen, Guo-Dong Su, Chia-Chen Lin, and Yung-Hui Li. 2022. "Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images" Symmetry 14, no. 3: 509. https://doi.org/10.3390/sym14030509

APA Style

Chang, C. -C., Su, G. -D., Lin, C. -C., & Li, Y. -H. (2022). Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry, 14(3), 509. https://doi.org/10.3390/sym14030509

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop