Abstract
Reversible data hiding (RDH) is a steganographic method that can restore the cover medium after extracting the embedded secret data. This work proposes a novel RDH scheme based on turtle shell (TS) reference matrix with dual image shadows. By modifying a cover pixel pair, two stego pixel pairs are generated and separately recorded to two image shadows. The first stego pixel pair is embedded with three bits of secret data, while the second stego pixel pair is embedded with one secret bit and require no information for recovery of the cover pixels. Since secret data is embedded through slight modification of cover pixel values, experimental results show that the image shadows have good visual quality and are robust under steganalysis attack. In addition, an authentication mechanism is proposed to detect tampered shadows.
Similar content being viewed by others
References
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
Chang C-C, Kieu TD, Chou Y-C(2007) Reversible data hiding scheme using two steganographic images. In:: Proceedings of IEEE Region 10 International Conference (TENCON), p 1-4
Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: Proceedings of Third International Conference on Innovative Computing information and control, p 17-17
Chang C-C, Chou Y-C, Kieu TD (2009) Information hiding in dual images with reversibility. In: Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, 145-152
Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kitakyushu, Japan
Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Security and Watermarking of Multimedia Contents IV. Int Soc Opt Photonics 4675:1–13
Hassan FS, Gutub A (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl 79(39):30087–30109
Hong W, Chen T-S, Shiu C-W(2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 82(11):1833–1842
Huynh N-T, Bharanitharan K, Chang C-C(2015)Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105–112
Hwang M-S, Lu EJ-L, Lin I-C(2003) A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowl Data Eng 15(6):1552–1560
Jia Y et al (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163:238–246
Lee C-F, Huang Y-L(2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247
Li X et al (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22:2181–21913
Lin J-Y, Liu Y, Chang C-C(2019) A real-timedual-image-based reversible data hiding scheme using turtle shells. J Real-Time Image Proc 16(3):673–684
Liu Y, Chang C-C(2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310
Ni Z et al (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Schneier B (1996) Applied Cryptography. Wiley, Hoboken
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Tsai P, Hu Y-C, Yeh H-L(2009) Reversible image hiding scheme using predictive coding and histogram shifting. Sig Process 89(6):1129–1143
Weng S et al (2019) Dynamic improved pixel value ordering reversible data hiding. Inf Sci 489:136–154
Yin Z, Xiang Y, Zhang X (2019) Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans Multimed 22(4):874–884
Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit Lett 3(25):331–339
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Acknowledgements
This work is partially supported by the Education and Research Project for Young and Middle-aged Teachers in Fujian Province (Grant number: JAT200458).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
We confirm that this manuscript has been neither submitted to any other journals nor previously a conference paper, and all text and graphics, except for those marked with sources, are original works of the authors.
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lin, JY., Horng, JH. & Chang, CC. A reversible and authenticable secret sharing scheme using dual images. Multimed Tools Appl 81, 17527–17545 (2022). https://doi.org/10.1007/s11042-022-12430-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12430-0