Next Article in Journal
Observer-Based Adaptive Consensus Protocol Design for Multi-Agent Systems with One-Sided Lipschitz Nonlinearity
Next Article in Special Issue
Pooled Steganalysis via Model Discrepancy
Previous Article in Journal
An Out-of-Distribution Generalization Framework Based on Variational Backdoor Adjustment
Previous Article in Special Issue
Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Matrix Coding-Oriented Reversible Data Hiding Scheme Using Dual Digital Images

1
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2
Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan
3
Department of Electrical Engineering, National Quemoy University, Kinmen 89250, Taiwan
*
Authors to whom correspondence should be addressed.
Mathematics 2024, 12(1), 86; https://doi.org/10.3390/math12010086
Submission received: 11 November 2023 / Revised: 5 December 2023 / Accepted: 24 December 2023 / Published: 26 December 2023
(This article belongs to the Special Issue Data Hiding, Steganography and Its Application)

Abstract

:
With the development of Internet technology, information security and data protection have become particularly important. Reversible data hiding is an effective technique for data integrity and privacy protection, and secret image sharing is a distinct research field within reversible data hiding. Due to the ability of sharing secret information between two receivers and the larger embedding capacity compared to the traditional reversible data hiding scheme, dual digital images have also attracted extensive research in the past decade. In this paper, we propose a reversible data hiding scheme based on matrix coding using dual digital images. By modifying the bits in the pixels, we can conceal three bits of the secret message in two pixels. In other words, the embedding rate reaches 1.5 bits per pixel (bpp). The experimental results demonstrate that our method has a significantly larger embedding capacity of 786,432 bits compared to previous similar methods while still maintaining acceptable image quality defined by a peak signal-to-noise ratio (PSNR) greater than 30 dB. The proposed scheme is suitable for applications required to pass a large amount of data but with minor security of image quality to be visually acceptable.

1. Introduction

Since the Internet age started, the Internet has dominated our daily lives, with a tremendous amount of data and information transmitted through the Internet and world wide web every single minute. Some of the data can contain sensitive or secretive information, which requires higher levels of protection to prevent illegal hacking or misusage.
Securing of personal information or industrial knowhow has become essential; hence, scholars are encouraged to find solutions to resolve these serious problems in order to safeguard the communication channels and give users peace of mind. Data hiding (DH) [1,2] is one of the essential research areas, which provides methodologies to protect data effectively. Depending on the applications, content owners and data hiders can choose assorted schemes suitable for their requirements. Some receivers may only need to extract secret messages; yet, others may want to fully recover the original media. Therefore, the data hiding is branched out into irreversible [3,4] and reversible [5,6] depending on whether the original media can be retrieved completely or not after data recovery. Because the full reversibility of the original media offers wider applicability, studies of reversible data hiding (RDH) [7,8,9,10,11,12] have become more popular in the recent decades.
Digital images are commonly used media for scientists to exercise and verify their concepts and approaches. Secret image sharing (SIS) technology was proved to be a proficient way to protect private images by generating multiple shares called image shadows. The idea of secret image sharing derived from secret sharing was proposed by Shamir back in 1979 [13]. The secret was shared and recovered by employing Lagrange interpolation. Yan et al. realized an SIS scheme based on the Chinese remainder theorem (CRT) [14] later on. With a twist of the SIS technique, a special edition of RDH using dual images was proposed by Chang et al. in 2007 [15]. Dual-image methods generate two stego images, which increase the safety of the secret data, visual image quality, and embedding capacity. Unless both stego images can be obtained simultaneously, the extraction of the secret data cannot be completed. Because dual image schemes can offer stronger safekeeping and recovery abilities, there is higher demand to discover innovative or improved solutions [16,17,18,19,20] to achieve either better visual quality of stego images or higher embedding capacity. Our novel scheme emphasizes enhancing the embedding capacity but with satisfactory image quality. The experimental results assured us that the embedding rates reached 1.5 bits per pixel (bpp). The contributions of this particular study are:
  • The embedding capacity is significantly larger, which can be up to 786,432 bits.
  • It is a suitable solution for applications requiring high embedding capacity but that can scarify the image quality to be visually acceptable.
  • Both the process of embedding and the process of extraction are simple and have a satisfiable execution time. The shadow construction phase took 0.5242 s, while the secret message extraction and the image reconstruction phase took 0.9158 s.
In Section 2, we describe the fundamental concept of a matrix coding method to be utilized in the scheme. The details of data embedding and extraction are explained in Section 3, and the related experiments and analysis are presented in Section 4. At the end of the study, we summarize the findings and the potential future improvement in Section 5.

2. Related Work

In this section, we would like to refresh the principle of a matrix coding method [21], which was initially proposed by Chang et al. in 2008.
The matrix coding method adopts a parity check matrix H as shown in Equation (1). Suppose we have a 7-dimensional cover vector v = [ 1010100 ] and a secret message m = [ 110 ] . According to Equation (2), we can calculate the S y n d r o m e = 110 111 = [ 001 ] . Then, we match the calculated syndrome in Table 1 to obtain the corresponding coset leader 1000000 . Finally, we can calculate the stego vector v = v C o s e t   l e a d e r = 1010100 1000000 = [ 0010100 ] through Equation (3). To summarize the above process, simply put, the stego vector v changes one bit in v according to the coset leader associated with the syndrome. In this way, the data embedding process is completed. The extraction process is simpler. According to Equation (4), the secret message m = H v = [ 110 ] can be easily extracted.
H = 0 0 1   0 1 0   0 1 1   1 0 0   1 0 1   1 1 0   1 1 1 .
S y n d r o m e = m H v .
v = v C o s e t   l e a d e r .
m = H v .
Through the matrix coding method, we can modify only one bit in the vector to effectively embed three secret bits. This remarkable efficiency not only ensures minimal impact on the original data but also provides a high level of security in concealing sensitive information.

3. Proposed Scheme

The dual image technique is employed for the novel scheme. The shadow construction phase is described in Section 3.1, and the secret message extraction and original image reconstruction phase are detailed in Section 3.2. Two covered images C I 1 and C I 2 are duplicates from the original image O I with size m × n . A secret message S is embedded to covered images C I 1 , C I 2 to create shadow images S I 1 and S I 2 . The shadow images are sent to designated receivers. When both shadow images appear at the same time, both the recovered secret message R S and the recovered image R I can be extracted. The scheme process is illustrated in Figure 1.
To better understand the process, we show two examples in Figure 2 exercising the whole flow. In Figure 2a, the pixel values of the current pixel pair are converted to their binary format (10100010)2 from 162 first, four LSBs (0010)2 are extracted from the cover pixel of the cover image C I 1 and three LSBs (010)2 are extracted from the cover pixel of the cover image C I 2 to form a 7-dimensional cover vector (0010010). There are three secret bits that can be embedded into the cover vector to create a 7-dimentional shadow vector (0000010) using the matrix coding technique. We split the shadow vector into four bits (0000) and three bits (010) and replace the corresponding pixels: four LSBs in the shadow pixel of the shadow image C I 1 and three LSBs in the shadow pixel of the shadow image C I 2 . A recovery bit is the fourth LSB in the shadow pixel of the shadow image C I 2 , which records the original bit value of the bit altered during data embedding. By bitwise comparison of two shadow pixels, we can recover the original pixel value with the help of the recovery bit. The pixel value (10100000)2 in the shadow image C I 1 is 160, and the pixel value (10101010)2 in the shadow image C I 2 is 170 after the decimal format conversion.
Figure 2b shows an example similar to Figure 2a, except it is a case when the current pixel count is even. The 7-dimensional cover vertex is composed of three LSBs from the cover pixel of the cover image C I 1 and four LSBs from the cover pixel of the cover image C I 2 . After the shadow vertex is generated, the split is three bits for the shadow pixel of the shadow image C I 1 and four bits for the shadow pixel of the image C I 2 . The recovery bit becomes the fourth LSB in the shadow pixel of the shadow image C I 1 . The exchanging of the bit-split patterns based on odd or even pixel count is to minimize the visual distortion of the shadow images and to keep a balanced visual quality of the two shadows.

3.1. Shadow Construction Phase

To embed a secret message, we move through a shadow construction phase to generate two shadow images using the matrix code method described in Section 2.
In order to meet the requirement of being reversible, we use a pixel pair, one from cover image C I 1 = p 1,0 ,   p 1,1 ,   ,   p 1 , ( n × m ) 1 and the corresponding pixel from C I 2 = p 2,0 ,   p 2,1 ,   ,   p 2 , ( n × m ) 1 , where n is the total number of pixels in images. S = s 0 ,   s 1 ,   ,   s k , ,   s r 1 , where s k ∈{0, 1}, and r is the length of secret bits. When a cover pixel pair p p i = ( p 1 i ,   p 2 i ) , the two pixel values for the pair are converted into binary format and represented as p 1 , i = b 1,7 , b 1,6 ,   b 1,5 ,   ,   b 1,0 2 and p 2 , i = b 2,7 , b 2,6 ,   b 2,5 ,   ,   b 2,0 2 . A 7-dimensional cover vector v i is then constructed by using the least significant bits (LSBs) in these two cover pixels according to Equation (5).
v i = ( b 1,3 ,   b 1,2 , b 1,1 ,   b 1,0 ,   b 2,2 ,   b 2,1 , b 2,0 ) ,   i f   i   i s   o d d ( b 1,2 ,   b 1,1 , b 1,0 ,   b 2,3 ,   b 2,2 ,   b 2,1 , b 2,0 ) ,   i f   i   i s   e v e n ,
where i is the index of the current pixel, and 0   i   n × m 1 . The i can also be treated as the current pixel count p c . Therefore, p c is the same as i . Algorithm 1 describes the construction of shadow images S I 1 and S I 2 step by step.
Algorithm 1. Shadow Construction
Input An original image O I and a secret message S .
OutputShadow images S I 1 , S I 2 .
Step 1Duplicate the original image and create two cover images C I 1 , C I 2 .
Step 2Set the initial secret bit count b c = 0
Step 3FOR each p c ,   0 p c   n × m 1
Step 3a   Obtain three secret bits s b c + s b c + 1 + s b c + 2
Step 3b   Select current cover pixel pair p p i   = ( p 1 , i ,     p 2 , i ) , where i = p c , pixel p 1 , i from the cover image C I 1 and pixel p 2 , i from the cover image C I 2 .
Step 3c   Convert pixel values p 1 , i and p 2 , i to binary.
Step 3d   Construct the 7-dimensional cover vector v i using Equation (5).
Step 3e   Calculate the S y n d r o m e and obtain the shadow vector s v i using Equations (2) and (3).
Step 3f   Let v i = v b i , 6 ,   v b i , 5   ,   v b i , 4   ,   v b i , 3   ,   v b i , 2   ,   v b i , 1   ,   v b i , 0 and
        s v i = s b i , 6   ,   s b i , 5   ,   s b i , 4   ,   s b i , 3   ,   s b i , 2   ,   s b i , 1   ,   s b i , 0  
Step 3g   Set the recovery bit b 0 to store the original bit value for recovery as below,
       i s   S a m e = ( ( s b i , 5   ,   s b i , 4   ,   s b i , 3 ) = = ( s b i , 2   ,   s b i , 1   ,   s b i , 0 ) )
IF i s   S a m e
               b 0 = v b i , 6
  ELSE
                j = 0
WHILE j < 3
IF s b i , j + 3   s b i , j
               b 0 = v b i , j
BREAK
END
                j = j + 1
END
END
Step 3h   Set shadow pixel pair s p p i = s p 1 , i   , s p 2 , i , where s p 1 , i ,   is the current
pixel in shadow images S I 1 and s p 2 , i ,   is the current pixel in shadow images
S I 2 according to
IF p c is odd
s p 1 , i   = ( b 1,7 ,   b 1,6 ,   b 1,5 , b 1,4 ,   s b i , 6 ,   s b i , 5 ,   s b i , 4 ,   s b i , 3 )
s p 2 , i   = ( b 2,7 , b 2,6 ,   b 2,5 , b 2,4 , b 0 ,   s b i , 2 ,   s b i , 1 ,   s b i , 0 )
ELSE
s p 1 , i   = ( b 1,7 ,   b 1,6 ,   b 1,5 , b 1,4 ,   b 0 ,   s b i , 6 ,   s b i , 5   ,   s b i , 4 )
s p 2 , i   = ( b 2,7 , b 2,6 , b 2,5 , b 2,4 ,   s b i , 3 ,   s b i , 2 ,   s b i , 1 , s b i , 0 )
END
END
Step 4Export shadow images S I 1 , S I 2 .

3.2. Secret Message Extraction and Original Image Reconstruction Phase

The secret extraction and recovery of the original image is simple and straight forward, which can save computation time. After having both of the shadow images, a shadow vector can be constructed using Equation (5). Secret bits can be extracted from the shadow vector by looking up Table 1 directly. The shadow vector is the coset value in the matrix coding table to obtain the corresponding syndrome, which is the desired three secret bits to be extracted. By using the value of the recovery bit, the shadow vector is converted back to the original vector (or it can be called a recovered vector). The original vector (or recovered vector) is split into two sets of bits and restores the LSBs of the pixel back to the original image (or the recovered image). To clarify the process of extraction and recovery, Algorithm 2 explains the steps in detail.
Algorithm 2. Secret Message Extraction and Original Image Reconstruction
Input Dual shadow images S I 1 , S I 2 .
OutputRecovered image R I , and recovered secret message R S .
Step 1Duplicate S I 1 to R I .
Step 2Set the initial secret bit count b c = 0 .
Step 3FOR each p c ,   0   p c n × m 1
   Set i = p c
Step 3a   Set the current shadow pixel pair s p p i = s p 1 , i   ,   s p 2 , i , where s p 1 , i ,   is the current pixel in the shadow image S I 1 and s p 2 , i ,   is the current pixel in the shadow images S I 2 .
Step 3b   Convert pixel values s p 1 , i and s p 2 , i to binary and let
s p 1 ,   i = s b 1,7 ,   s b 1,6 ,   s b 1,5 , s b 1,4 ,   s b 1,3 , s b 1,2 , s b 1,1 , s b 1,0 and
s p 2 ,   i = s b 2,7 ,   s b 2,6 ,   s b 2,5 , s b 2,4 ,   s b 2,3 , s b 2,2 , s b 2,1 , s b 2,0 .
Step 3c   Construct the shadow vector s v i = s b i , 6   ,   s b i , 5   ,   s b i , 4   ,   s b i , 3   ,   s b i , 2   ,   s b i , 1   ,   s b i , 0   using Equation (5) and use it as the coset leader.
Step 3d   Extract three secret bits s b c + s b c + 1 + s b c + 2 based on the coset leader in Table 1 and append them to recovered secret message R S .
Step 3e    b c = b c + 3
Step 3f   Obtain the original bit value b 0 ,
IF p c is odd
               b 0 = s b 2,3
ELSE
b 0 = s b 1,3
END
Step 3g   Let r p i   = ( r b i , 7 ,   r b i , 6 ,   r b i , 5 ,   r b i , 4 ,   r b i , 3 ,   r b i , 2 ,   r b i , 1 ,   r b i , 0 )
Step 3h   Set the altered bit value back to its original value by the following:
              i s   S a m e = t r u e
                j = 0
WHILE j < 3
IF s b i , j + 3   s b i , j
               r b i , j = b 0
              i s   S a m e = f a l s e
BREAK
END
               j = j + 1
END
IF i s   S a m e = t r u e
               r b i , 3 = b 0
END
END
Step 4Export recovered images R I and recovered secret message R S .

3.3. Processing Flow Examples

Figure 3 shows the embedding, extraction, and recovery procedures using two examples. The flow examples (a) and (b) first illustrate how bits are extracted from two cover images, how an original vector is formed, and how shadow images are set based on intermediate-created shadow vector after secret embedding using matrix coding. Then, they show how a shadow vector is formed from shadow images to recover hidden secrets and show the recovered vector and the recovered image by replacing the altered bit value with the recovery bit value as well.
Let us take the example (a), which is the case of dealing with an odd number of pixels. During the shadow construction phase, the two cover pixels are (10100010)2. A 7-dimensional cover vector (0010010)2 is formed by four LSBs of a pixel from the cover image 1 and three LSBs of a pixel from the cover image 2. Assume the secret bits are (011)2, and through lookup Table 1, the syndrome (0010000)2 is the coset leader corresponding to the secret bits (011)2 according to Equation (2). Perform XOR calculation with the original vector, and a 7-dimensional shadow vector (0000010)2 is generated and split to update the four LSBs in the shadow pixel 1 and the three LSBs in the shadow pixel 2. The fourth bit from the left of the shadow pixel 2 is the recovery bit, which records the original bit value (1) for the second bit from the left of the cover pixel 1. In the secret message extraction and the image reconstruction phase, a shadow vector is formed by the two pixels of two shadow images the same way we formed the cover vector from two pixels of two cover images. We can then extract the secret bits (011)2 by using Table 1 directly. As for recovery of the original image, we can convert the shadow vector back to the original vector using the saved recovery bit value and update the four LSBs with any one of the shadow pixels to recover the original pixel, which can also be called a recovered pixel. Figure 3b moves through the same process with an example dealing with an even number of pixels.

4. Experimental Results

In this section, we evaluate the performance of our proposed matrix coding using a dual digital images scheme. As depicted in Figure 4, we selected eight standard gray images for our experiments. Our experiments were conducted on a laptop running the Windows 10 operating system with MATLAB R2023b. The laptop is equipped with a 3.20 GHz AMD Ryzen 7 CPU and 16 GB of RAM. We also compared the experimental results with other advanced reversible data hiding schemes based on dual images and our scheme demonstrated a significant advantage in embedding capacity (EC).
The Peak Signal-to-Noise Ratio (PSNR) and the Structural Similarity Index (SSIM) are widely used as visual quality indicators for evaluating the performance of data hiding. The PSNR is employed to assess the difference in visual quality between two images and is calculated using Equations (6) and (7). In Equation (7), m and n represent the size of the image, while i and j represent individual pixels. In this context, I represents the original image, and K represents the shadow image. A smaller Mean Square Error (MSE) corresponds to less distortion in the image, indicating higher quality in the constructed image. Conversely, because the PSNR and MSE are inversely proportional, a higher PSNR value reflects the same conclusion.
P S N R = 10 × l o g 10 255 2 M S E
M S E = 1 m × n i = 1 m j = 1 n I i , j K i , j 2
The SSIM is an indicator that quantifies the similarity between two images. It is primarily used to assess the similarity and dissimilarity between two images, denoted as x and y . As shown in Equation (8), the SSIM algorithm separately compares the luminance, contrast, and structure of two images and then combines them using weighted products. In this equation, μ x and μ y represent the mean luminance, σ x and σ y denote the standard deviation of the luminance, σ x y represents the covariance of x and y , and C is a constant used to maintain stability. The closer the SSIM is to 1, the higher the similarity between the two images.
S S I M x , y = 2 μ x μ y + C 1 2 σ x y + C 2 μ x 2 + μ y 2 + C 1 σ x 2 + σ y 2 + C 2 .
Figure 5 illustrates the shadow image constructed by our innovative matrix coding scheme. Clearly, the disparity between the constructed shadow image and the original image is minimal. It is challenging for us to discern any perceptible distortion with the naked eye, underscoring the superior visual quality achieved by our scheme. Table 2 illustrates the results obtained using our proposed matrix coding scheme to construct shadow 1 and shadow 2 from test images. It calculates the PSNR and SSIM values between these shadow images and the original image, as well as their average values. The average PSNR is approximately 36.34 dB, which is generally considered challenging to distinguish with the naked eye when it exceeds 30; these data support our conclusion. Furthermore, the average SSIM value is remarkably high at 0.9227, approaching 1. This indicates that the shadows constructed by our proposed scheme closely resemble the original images, confirming their excellent visual quality. These outstanding results substantiate the effectiveness of our solution and demonstrate its superiority in preserving image fidelity.
Table 3 presents a comparison of the performance indicators between our scheme and other schemes based on reversible data hiding using dual images. Our primary focus is on the EC and PSNR. The embedding rate is expressed in bits per pixel (bpp), calculated as shown in Equation (9), where M and N represent the image dimensions. The embedding capacity is divided by all pixels to signify how many bits can be embedded in each pixel. The experimental results demonstrate that the embedding capacity of our proposed scheme reaches 786,432 bits, which is equivalent to 1.5 bpp calculated as 786,432 512 × 512 using Equation (9). The EC of the novel scheme significantly exceeds that of other schemes. When compared to a scheme with the largest embedding capacity, ours is nearly 50% higher than the one with 557,339 bits. Even with our PSNR above 36 dB, it can be still lower than that of other solutions. However, this is consistent with the laws of nature. A larger embedding capacity inherently entails more modifications, resulting in greater distortion. However, our PSNR remains above 30, meeting the criteria for high visual quality. It is challenging for the naked eye to discern any distortion, making this trade-off acceptable in light of the significantly increased embedding capacity.
b p p = E C M × N
Table 4 shows the execution time of our proposed scheme in the secret message extraction and original image reconstruction phase. It is evident that the execution time is consistently within 1 s at every stage demonstrating the great performance of our scheme.

5. Conclusions

In this paper, we propose a reversible data hiding scheme with a high embedding capacity using matrix coding based on dual images. Our solution only requires modifying or not modifying one bit, enabling us to conceal three bits of a secret message in two pixels. The experimental results demonstrate that this solution significantly increases the embedding capacity when compared to other similar methods, allowing for up to 786,432 bits, which is equivalent to 1.5 bpp, all while maintaining a high level of visual quality. This illustrates the superiority and applicability of our scheme.
Applications that require dual sharing of information between two and only two receivers, such as a couple who share secret arrangements, to recover the original media can consider utilizing our scheme. In the future, we will investigate different types of matrix coding to improve the embedding capacity or to improve the visual quality.

Author Contributions

Conceptualization, J.-C.L., Y.L. and C.-C.C. (Chin-Chen Chang); methodology, J.-C.L., Y.L. and C.-C.C. (Chin-Chen Chang); software, Y.L.; validation, Y.L.; writing—original draft preparation, J.-C.L. and Y.L.; writing—review and editing, J.-C.L., Y.L., C.-C.C. (Chin-Chen Chang), J.-H.H. and C.-C.C. (Ching-Chun Chang). All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Kumar, R.; Chand, S. A new image steganography technique based on similarity in secret message. In Proceedings of the Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), Noida, India, 26–27 September 2013; IET: Stevenage, Hertfordshire, UK, 2013; pp. 376–379. [Google Scholar] [CrossRef]
  2. Sahu, A.K.; Swain, G. An optimal information hiding approach based on pixel value differencing and modulus function. Wirel. Pers. Commun. 2019, 108, 159–174. [Google Scholar] [CrossRef]
  3. Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. Techniques for data hiding. IBM Syst. J. 1996, 35, 313–336. [Google Scholar] [CrossRef]
  4. Moulin, P.; O’Sullivan, J.A. Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 2003, 49, 563–593. [Google Scholar] [CrossRef]
  5. Celik, M.U.; Sharma, G.; Tekalp, A.M.; Saber, E. Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 2005, 14, 253–266. [Google Scholar] [CrossRef] [PubMed]
  6. Zhang, W.; Hu, X.; Li, X.; Yu, N. Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 2013, 22, 2775–2785. [Google Scholar] [CrossRef]
  7. Lin, C.C.; Liu, X.L.; Tai, W.L.; Yuan, S.M. A novel reversible data hiding scheme based on AMBTC compression technique. Multimed. Tools Appl. 2015, 74, 3823–3842. [Google Scholar] [CrossRef]
  8. Sun, W.; Lu, Z.M.; Wen, Y.C.; Yu, F.X.; Shen, R.J. High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process. 2013, 7, 297–306. [Google Scholar] [CrossRef]
  9. Chen, K.M. High capacity reversible data hiding based on the compression of pixel differences. Mathematics 2020, 8, 1435. [Google Scholar] [CrossRef]
  10. Rai, A.K.; Kumar, N.; Kumar, R.; Om, H.; Chand, S.; Jung, K.H. Intra-block correlation based reversible data hiding in encrypted images using parametric binary tree labeling. Symmetry 2021, 13, 1072. [Google Scholar] [CrossRef]
  11. Mittal, S.; Goyal, S.; Aggarwal, S.; Kumar, R. Interpolative AMBTC based reversible data hiding in encrypted images using rhombus mean. In Proceedings of the 2023 International Conference on Device Intelligence, Computing and Communication Technologies (DICCT), Dehradun, India, 17–18 March 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 451–456. [Google Scholar] [CrossRef]
  12. Kumar, R.; Sharma, D.; Dua, A.; Jung, K.H. A review of different prediction methods for reversible data hiding. J. Inf. Secur. Appl. 2023, 78, 103572. [Google Scholar] [CrossRef]
  13. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  14. Yan, W.; Ding, W.; Dongxu, Q. Image sharing based on Chinese remainder theorem. J. North China Univ. Technol. 2000, 12, 6–9. [Google Scholar]
  15. Chang, C.C.; Kieu, T.D.; Chou, Y.C. Reversible data hiding scheme using two steganographic images. In Proceedings of the TENCON 2007—2007 IEEE Region 10 Conference, Taipei, Taiwan, 30 October–2 November 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 1–4. [Google Scholar] [CrossRef]
  16. Qin, C.; Chang, C.C.; Hsu, T.J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 2015, 74, 5861–5872. [Google Scholar] [CrossRef]
  17. Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 2015, 108, 77–89. [Google Scholar] [CrossRef]
  18. Huang, C.T.; Weng, C.Y.; Shongwe, N.S. Capacity-Raising Reversible Data Hiding Using Empirical Plus–Minus One in Dual Images. Mathematics 2023, 11, 1764. [Google Scholar] [CrossRef]
  19. Jana, B.; Giri, D.; Kumar Mondal, S. Dual image based reversible data hiding scheme using (7, 4) hamming code. Multimed. Tools Appl. 2018, 77, 763–785. [Google Scholar] [CrossRef]
  20. Kim, C.; Yang, C.N.; Zhou, Z.; Jung, K.H. Dual efficient reversible data hiding using Hamming code and OPAP. J. Inf. Secur. Appl. 2023, 76, 103544. [Google Scholar] [CrossRef]
  21. Chang, C.C.; Kieu, T.D.; Chou, Y.C. A high payload steganographic scheme based on (7, 4) hamming code for digital images. In Proceedings of the 2008 International Symposium on Electronic Commerce and Security, Guangzhou, China, 3–5 August 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 16–21. [Google Scholar] [CrossRef]
Figure 1. Process of the proposed scheme.
Figure 1. Process of the proposed scheme.
Mathematics 12 00086 g001
Figure 2. Examples of the proposed flow: (a) the odd pixel count, (b) the even pixel count.
Figure 2. Examples of the proposed flow: (a) the odd pixel count, (b) the even pixel count.
Mathematics 12 00086 g002
Figure 3. Examples for embedding, extraction, and recovery: (a) the odd pixel count, (b) the even pixel count.
Figure 3. Examples for embedding, extraction, and recovery: (a) the odd pixel count, (b) the even pixel count.
Mathematics 12 00086 g003
Figure 4. Eight 512 × 512 test images: (a) airplane, (b) baboon, (c) Barbara, (d) boat, (e) Goldhill, (f) lake, (g) Lena, (h) peppers.
Figure 4. Eight 512 × 512 test images: (a) airplane, (b) baboon, (c) Barbara, (d) boat, (e) Goldhill, (f) lake, (g) Lena, (h) peppers.
Mathematics 12 00086 g004
Figure 5. Shadow images of eight test images, with shadow 1 on the left and shadow 2 on the right: (a,b) airplane, (c,d) baboon, (e,f) Barbara, (g,h) boat, (i,j) Goldhill, (k,l) lake, (m,n) Lena, (o,p) peppers.
Figure 5. Shadow images of eight test images, with shadow 1 on the left and shadow 2 on the right: (a,b) airplane, (c,d) baboon, (e,f) Barbara, (g,h) boat, (i,j) Goldhill, (k,l) lake, (m,n) Lena, (o,p) peppers.
Mathematics 12 00086 g005
Table 1. The cosets of the matrix coding with the parity check matrix H .
Table 1. The cosets of the matrix coding with the parity check matrix H .
Syndrome000001010011100101110111
Coset leader00000001000000010000000100000001000000010000000100000001
Table 2. Proposed scheme for PSNR and SSIM on different images.
Table 2. Proposed scheme for PSNR and SSIM on different images.
ImagesPSNR (dB)SSIM
Shadow 1Shadow 2AverageShadow 1Shadow 2Average
Airplane36.3636.3536.350.89900.89840.8987
Baboon36.3336.3436.330.96450.96440.9645
Barbara36.3636.3636.360.93130.93130.9313
Boat36.3036.2736.280.92590.92550.9257
Goldhill36.3236.3336.320.92740.92790.9277
Lena36.4136.3736.390.90300.90260.9028
Lake36.3436.3636.350.92530.92560.9255
Peppers36.3636.3636.360.90530.90530.9053
Average36.3536.3436.340.92270.92260.9227
Table 3. Comparison of the maximum EC, bpp, and PSNR values with other reversible data hiding scheme based on dual images.
Table 3. Comparison of the maximum EC, bpp, and PSNR values with other reversible data hiding scheme based on dual images.
SchemeIndicatorBarbaraGoldhillLenaPeppers
proposed schemeEC786,432786,432786,432786,432
bpp1.501.501.501.50
PSNR136.3636.3236.4136.36
PSNR236.3636.3336.3736.36
PSNRAVG36.3636.3236.3936.36
Qin et al. [16]EC557,339557,194557,052557,245
bpp1.061.061.061.06
PSNR152.1252.1252.1151.25
PSNR241.5841.5841.5841.52
PSNRAVG46.8546.8546.8546.39
Lu et al. [17]EC524,288524,288524,288524,192
bpp1.001.001.001.00
PSNR149.1449.1749.1349.11
PSNR249.1149.0949.1249.08
PSNRAVG49.1349.1349.1349.10
Jana et al. [19]EC74,75274,75275,75273,728
bpp0.140.140.140.14
PSNR151.8651.8651.8551.84
PSNR251.9651.9751.5651.94
PSNRAVG51.9151.9251.7151.89
Kim et al. [20]EC524,288524,288524,288524,288
bpp1.001.001.001.00
PSNR154.1254.1654.1454.15
PSNR248.1448.1148.1348.12
PSNRAVG51.1351.1451.1451.14
Table 4. The execution time of our proposed scheme.
Table 4. The execution time of our proposed scheme.
PhaseExecution Time (s)
Shadow Construction Phase0.5242
Secret Message Extraction and Original Image Reconstruction Phase0.9158
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, J.-C.; Chang, C.-C.; Lin, Y.; Chang, C.-C.; Horng, J.-H. A Matrix Coding-Oriented Reversible Data Hiding Scheme Using Dual Digital Images. Mathematics 2024, 12, 86. https://doi.org/10.3390/math12010086

AMA Style

Liu J-C, Chang C-C, Lin Y, Chang C-C, Horng J-H. A Matrix Coding-Oriented Reversible Data Hiding Scheme Using Dual Digital Images. Mathematics. 2024; 12(1):86. https://doi.org/10.3390/math12010086

Chicago/Turabian Style

Liu, Jui-Chuan, Ching-Chun Chang, Yijie Lin, Chin-Chen Chang, and Ji-Hwei Horng. 2024. "A Matrix Coding-Oriented Reversible Data Hiding Scheme Using Dual Digital Images" Mathematics 12, no. 1: 86. https://doi.org/10.3390/math12010086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop