Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Skein Invariants of Links and Their State Sum Models
Next Article in Special Issue
Denoising and Feature Extraction Algorithms Using NPE Combined with VMD and Their Applications in Ship-Radiated Noise
Previous Article in Journal
Evaluation of Airplane Boarding/Deboarding Strategies: A Surrogate Experimental Test
Previous Article in Special Issue
An Interactive Personalized Recommendation System Using the Hybrid Algorithm Model
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

1
Department of Information Management, Chaoyang University of Technology, Taichung 41349, Taiwan
2
Department of Mathematics, National Changhua University of Education, Changhua 50058, Taiwan
*
Author to whom correspondence should be addressed.
Symmetry 2017, 9(10), 223; https://doi.org/10.3390/sym9100223
Submission received: 19 September 2017 / Revised: 6 October 2017 / Accepted: 9 October 2017 / Published: 12 October 2017
(This article belongs to the Special Issue Information Technology and Its Applications)
Figure 1
<p>Diagram of the information hiding process.</p> ">
Figure 2
<p>Information hiding categories. LSB: least significant bit substitution method, PVD: the pixel-value differencing method, EMD: the exploiting modification direction method, DE: difference expansion, HS: histogram shifting, PVO: pixel-value ordering method.</p> ">
Figure 3
<p>Dual-image based hiding scheme. (<b>a</b>) Embed secret messages into two of the same cover images; (<b>b</b>) Extract secret messages from the two stego-images.</p> ">
Figure 4
<p>Direction-based embedding rules.</p> ">
Figure 5
<p>Data embedding method using five directions.</p> ">
Figure 6
<p>Example value range of the central-folding strategy with <math display="inline"> <semantics> <mi>K</mi> </semantics> </math> = 3.</p> ">
Figure 7
<p>Diagram of Lu’s center-folding strategy.</p> ">
Figure 8
<p>Diagram of the proposed block folding technique.</p> ">
Figure 9
<p>Information hiding diagram of the proposed scheme.</p> ">
Figure 10
<p>Diagram of the averaging embedding method.</p> ">
Figure 11
<p>Example of the proposed method. (<b>a</b>) Secret encoding; (<b>b</b>) Embedding example.</p> ">
Figure 12
<p>Example of a block with three embeddable pixels.</p> ">
Figure 13
<p>Diagram of the extraction and recovery processes.</p> ">
Figure 14
<p>Six test images.</p> ">
Figure 15
<p>Four secret images.</p> ">
Figure 16
<p>Results of the first experiment.</p> ">
Figure 16 Cont.
<p>Results of the first experiment.</p> ">
Figure 16 Cont.
<p>Results of the first experiment.</p> ">
Figure 17
<p>Comparison of the proposed and related methods.</p> ">
Figure 17 Cont.
<p>Comparison of the proposed and related methods.</p> ">
Figure 18
<p>Histogram steganalysis of Lena with different parameters.</p> ">
Figure 19
<p>RS-diagram steganalysis of Lena with the secret image “random”.</p> ">
Versions Notes

Abstract

:
The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

1. Introduction

Information hiding is a technique that conceals secret messages in digital media. The sender embeds secret messages in a cover image to generate a stego-image and then sends it to the receiver. The receiver can extract the secret messages from the stego-image (Figure 1).
In general, information hiding schemes can be classified into two categories, i.e., reversible data hiding and irreversible data hiding, as shown in Figure 2. The most commonly used irreversible data hiding methods include the least significant bit (LSB) substitution method, the pixel-value differencing (PVD) method, and the exploiting modification direction method (EMD) [1,2,3,4,5,6,7,8,9,10,11,12,13,14]. The LSB method is a well-known irreversible data hiding technique because of its high payload and low distortion. It directly replaces the bits of the cover pixel with secret bits for embedding. Mielikainen (2006) proposes a modification to the LSB method called LSB matching [1]. In his method, the secret bits are embedded by using the binary function and four embedding rules.
Wu and Tsai (2003) proposed the PVD method [2]. In their method, the difference of two pixels in the cover image is calculated to determine the number of bits to be embedded in these two pixels and a pre-defined range table. The technique can embed a large number of secret bits into the cover image with high imperceptibility as it makes use of the characteristic of human vision sensitivity. Chang and Tseng (2004) utilized the difference of the predicted value and the target pixels to estimate the degree of smoothness or contrast of pixels to determine the number of bits to be embedded in the target pixels [3].
Zhang and Wang (2006) proposed the EMD method [4]. The EMD method provides a good image quality for the stego-image with a peak signal-to-noise ratio (PSNR) of more than 52 dB, since, at most, only one pixel in each pixel group needs to be increased or decreased by one. Kieu and Chang (2011) improved the EMD method by exploiting eight modification directions to embed several secret bits into a cover pair at a time [5].
Compared with irreversible data hiding schemes, reversible data hiding schemes can recover the cover image without any distortion from the stego-image after the secret messages have been extracted. The most commonly used reversible data hiding methods include the difference expansion (DE) method, histogram shifting (HS) method, and pixel-value ordering (PVO) method. Tian (2003) proposed the DE method [6] that embeds a secret bit into the LSB of the expanded difference of each pixel pair of the cover image. The scheme provides a high payload; however, the distortion caused by the DE is significant. Alattar (2004) improved Tian’s scheme with double the respective differences between four neighboring pixels and achieved more secret bits with the expanded difference [7].
Ni et al. (2006) proposed the HS method in 2006 [8]. Their method is to firstly generate the histogram by the pixel intensity value and shift the bins between the zero and peak point to create empty bins for data embedding. The advantage of the HS method is its low distortion; however, its drawback is a low payload, because the embedding capacity is determined by the number of points in the peak point of the bin. Li et al. and Gui et al. proposed an adaptive embedding technique that divides pixels into different types to enhance the embedding capacity of a prediction error [9,10].
Li et al. (2013) proposed the PVO method [11]. In their method, for each block, the pixels are reordered into a pixel vector, then the smallest pixel is predicted by the second smallest pixel, and the largest pixel is predicted by the second largest pixel. It uses prediction errors 1 and −1 to embed data, whereas prediction error 0 is unchanged. Peng et al. (2014) improved the PVO method to use larger blocks for embedding and take better advantage of image redundancy to yield a higher PSNR [12]. Qu and Kim (2015) modified the PVO method so that each pixel is predicted using its sorted context pixels to achieve a better embedding capacity in smooth image regions [13].
Wang et al. (2015) used a dynamic blocking strategy to divide the cover image adaptively into various-sized blocks. Thus, the flat image areas are preferentially divided into smaller blocks to retain a high embedding capacity and the rough areas are divided into larger blocks to avoid decreasing PSNR value [14].
The dual-image-based hiding scheme is a new technology in the information hiding field. The concept of dual-image, based on information sharing, consists of concealing secret messages in two of the same cover images; only someone who has both stego-images can extract the secret messages. A diagram of the dual-image based hiding scheme is shown in Figure 3. There are many advantages to using dual-image in data hiding, such as a high payload, reversibility, and strong robustness.
In the dual-image-based hiding scheme, image quality and payload are affected by embedding rules [15,16,17,18,19,20,21]. Chang et al. (2007) combined the EMD method with the dual-image technique to achieve a high payload and reduce distortion [15]. Lee et al. (2009) used combinations of pixel orientation locations with dual-image to enhance embedding capacity and preserve good visual quality [16]. Lee and Huang (2013) converted secret messages into quinary-based secret symbols and combined every two secret symbols as a set embedded in the dual-image [17]. Chang et al. (2013) converted secret messages into decimal-based secret symbols, then embedded secret symbols in a right diagonal line [18]. Qin et al. (2014) embedded secret messages in the first image using the EMD method and in the second image using other rules that were dependent on the first image [19]. Lu et al. (2015) used the LSB matching method and modified the non-reversible stego-pixels based on a rule table to restore the cover image [20]. They proposed the center-folding strategy to reduce the value of the secret symbols. Then, they embedded secret symbols in two stego-images through an averaging method [21]. Lu et al. (2016) proposed a frequency-based encoding method to reduce the distortion derived by the maximum secret digit [22].
In [21], Lu et al. propose a center-folding strategy in which each secret symbol is folded into the reduced digit before the embedding procedure to reduce the distortion of the stego-image. The folding strategy is simple and effective, to the extent that the image quality of the stego-image is very good. Because the folding strategy can obviously reduce the value, the proposed scheme performs the folding operation twice to further decrease the reduced digit.
Furthermore, in [22], Lu et al. use a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. The re-encoded technique also can be used to reduce the number of the secret digit and narrow down the distance between the stego-pixel and the original pixel.
Therefore, the proposed scheme first uses a frequency-based encoding strategy to encode the secret message and then uses the block folding technique by including the center-folding operation twice to embed secret messages. In addition, several steganalysis techniques are used to prove the strong robustness of the proposed scheme, including histogram steganalysis, Regular and singular groups (RS) steganalysis [23], primary sets, Chi square, sample pairs RS analysis, and fusion detection [24].
The rest of this paper is organized as follows. Section 2 describes related works. Section 3 introduces the proposed scheme. Section 4 summarizes the experiment results. The conclusions are presented in Section 5.

2. Related Works

In this section, we briefly introduce Lee et al.’s scheme, the center-folding strategy, and the frequency-based encoding strategy.

2.1. Lee et al.’s Methods

Lee et al. [16,17] proposed a direction-based dual-image method. In their scheme, two pixels P1 and P2 are used to conceal four secret bits and a direction map is used to represent the embedding rules. Figure 4 shows the direction map. Suppose that two pixels are P1 = 15, P2 = 20 and the secret bits are “00”. The direction map indicates that P1 = P1 + 1 = 15 + 1 = 16 and P2 = 20 for embedding “00” in the first stego-image. If the next two secret bits are “10”, then the stego-pixels are P1 = P1 = 15 and P2 = P2 + 1 = 20 + 1 = 21 for the second stego-image.
However, in some cases, the method cannot conceal secret data in the second stego-image. Therefore, only the first image is modified to embed the first two secret bits.
In 2013, Lee and Huang improved the above method by increasing the number of direction rules from four directions to five directions and redesigned the embedding rule to increase the embedding payload. The direction map is shown in Figure 5.

2.2. Center-Folding Strategy

In [21], Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit before the embedding procedure to reduce the distortion of the stego-image. For example, K bits of secret data were taken as a set and converted into the secret symbol d. The center-folding strategy changed the range of secret symbols from R = { 0 ,   1 ,   2 , , 2 K 1 } to R ¯ = { 2 K 1 , 2 K 1 + 1 , , 1 , 0 , 1 , , 2 K 1 2 , 2 K 1 1 } . The formula is as follows:
d ¯ = d 2 K 1 ,
where d ¯ is a folded secret symbol and 2 K 1 is an intermediate value.
After the folding, the value range of the secret symbol changed to [−2K−1, 2K−1−1]. Figure 6 shows an example where K is set to be 3. The maximum value of the value range is 7. Assume that a pixel value is 138. If the secret symbol d = 7 is added directly to the pixel to get the stego-pixel 138 + 7 = 145, then the image distortion inflicted is ( 145 138 ) 2 = 7 2 = 49 . However, in Lu et al.’s scheme, the symbol is folded as d   ¯ = 7 − 2 2 = 3. The folded symbol d ¯ = 3 instead of the original symbol 7 is added with the pixel 138 to get the stego-pixel 138 + 3 = 141. The image distortion caused by Lu et al.’s method is ( 141 138 ) 2 = 3 2 = 9 . The image distortion is reduced from 49 to 9.
It is obvious that the center-folding strategy is simple and effective; it can reduce the distortion of the stego-image after the embedding procedure. Therefore, in the proposed scheme, we perform the folding operation twice to further decrease the reduced digit.

2.3. Frequency-Based Encoding Strategy

In [22], Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. For example, suppose that the secret bit stream is “110 011 111 011 101 010 110 111”. First, the scheme converts each three bits (K = 3) as a group to a decimal digit stream as “7 3 7 3 5 2 6 7”. Next, it uses the center-folding strategy to reduce the digit stream as “3 −1 3 −1 1 −2 2 3”. Then, the frequency table can be made as Table 1, which records the rank of each reduced digit and map number of its new index in descending order by occurrence frequency.
Compared with embedding the re-encoded secret digit and the original secret digit, the frequency-based encoding strategy can be used to reduce the number of the secret digit and narrow down the distance between the original pixel and the stego-pixel.

3. Proposed Method

In Lu’s scheme, each secret symbol is reduced to the reduced digit using the center-folding strategy. A diagram of Lu’s center-folding strategy is shown in Figure 7. In the figure, the center value 5 is subtracted from each decimal message d to generate the reduced digit d ˜ . The value range of Figure 7 can be seen as a band. The maximum value of the band is 7 in Figure 7. After the folding, the band is separated into two sub-bands. The maximum absolute value of the two sub-bands is 4.
Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. The concept of the proposed scheme is shown in Figure 8. In the figure, the value range of d is first divided into two sub-bands SB1 and SB2. Each sub-band performs a one-time center-folding strategy. For example, the value range of sub-band SB1 is shown in Figure 8a. The center value of SB1 is 2. The center value 2 is subtracted from the values in SB1 to generate the reduced digit d ^ . We can see that the maximum absolute value of the two sub-bands is 2, which is smaller than the value 4 in Figure 8.
However, the sub-bands SB1 and SB2 have the same reduced values. We cannot distinguish the original value d from d ^ . Hence, an indicator is needed to identify which sub-band the reduced value d ^ is located in. If the reduced value d ^ is located in the sub-band SB1, then the indicator I is set to be 0, where I = 0 . In contrast, if the reduced value d ^ is located in the sub-band SB2, then the indicator I is set to be 1, where I = 1 . The original value d is mapped to a code pair ( I , d ^ ) to reduce the image distortion. For example, the decimal value d = 7 is mapped to the code pair ( I , d ^ ) = (1, 1).
However, the indicator is extra information that also needs to be concealed in the cover image and will decrease the hiding capacity. To solve this problem, the proposed scheme collects several indicators to produce a combined code and hides the code in a pixel. In the proposed scheme, the cover image is divided into several blocks. Each block has B pixels in it. The last pixel in the block is used to embed the combined code. The other pixels are used to conceal the reduced digit d ^ .
Furthermore, the proposed scheme considers the occurrence frequency of the decimal digit d to reassign proper code to the reduced digit d ^ that can significantly shrink the image distortion.

3.1. Embedding Procedure

In the proposed scheme, a cover image is divided into several blocks. Each block has B pixels in it. Let B K = { B K 1 , B K 2 , , B K B   } be the block. A secret image is formed as a binary string. The string is separated into several substrings the size of K . Each substring is transformed into a decimal digit d . The scheme computes the occurrence frequency of each decimal digit d to generate a histogram and sort the histogram in descending order. The digit d with the maximum frequency is encoded with the smallest distortion code pair ( I , d ^ ) .
Each block B K can be used to hide ( B 1 ) code pairs. The scheme conceals the reduced digit in the pixel B K i by using an averaging method to generate the stego-pixels B K i and B K i , where 1 i B 1 . The indicators are collected to form a combined code, and the code is concealed into the last pixel of the block to generate B K B and B K B .
Figure 9 shows the information hiding diagram of the proposed method. More details of the procedures are given below.
Step 1:
Transform a set of K secret bits into a decimal digit. Let d be the decimal digit that is computed by
d = j = 1 K 2 j 1 s j ,
where d ∈ [0, 2K − 1] and sj denotes the jth secret bit in the set.
Step 2:
Compute the occurrence frequency of each decimal digit. Let F ( d ) be the occurrence frequency of each decimal digit. These frequencies are sorted in descending order, and the index of sorted results is denoted as O ( d ) .
Step 3:
Compute the reduced code d ^ for each decimal digit. In Figure 6, the decimal digit d has been folded twice to generate the reduced code d ^ and the indicator I . Table 2 shows the reduced codes and indicators with K = 3. The decimal digits are reduced effectively from [0, 2K − 1] to [−2K−2, 2K−2 − 1].
However, the reduced digits in Table 2 do not show the feature of the secret image. In Table 2, the absolutely reduced code | d ^ | = 2 is the maximum reduced code, which causes maximum distortion when directly concealed into the pixel. If the maximum reduced code’s occurrence frequency is high, then directly embedding it in the image will decrease the visual quality. Hence, the proposed scheme further re-encodes the reduced code and indicator code according to the order of O ( d ) . The re-encoded code d ^ is computed by
d ^ = s i g n ( O ( d ) ) × O ( d ) 4 ,
where
s i g n ( v ) = { 1 , if v is an odd number , 1 , otherwise .
Step 4:
Compute the re-encoded indicator I by
I = { 0 , if O ( d )   = 0 , 1 , if mod ( ( O ( d ) + 1 ) , 4 ) = 0 o r mod ( O ( d ) , 4 ) = 0 , 0 , otherwise .
The above procedure re-encodes the reduced digits and indicators, which occurs most frequently as the minimum absolute value. The re-encoded code pairs of Table 2 are shown in Table 3.
Step 5:
Generate a mapping table for further embedding and recovery processes. Integrate the re-encoded code pairs ( I , d ^ ) with the indices d to form a mapping table. The mapping relationship must be recorded for use in the recovery phases. Table 4 shows an example mapping table with K = 3.
Step 6:
Divide a cover image into server blocks. Let B K = { B K 1 , B K 1 , , B K B   } be a block.
Step 7:
Pick ( B 1 ) code pairs { ( I 1 , d ^ 1 ) , ( I 2 , d ^ 2 ) , , ( I B 1 , d ^ B 1 ) } to embed into the block B K .
(1)
Conceal the re-encoded reduced digit d ^ i in the pixel B K i by using
B K i = B K i + d ^ 2 ,
and
B K i = B K i d ^ i 2 ,
where 1 i B 1 , B K i denotes the i th pixel of the first stego-block and B K i denotes the i th pixel of the second stego-block. Figure 10 shows that the proposed method can control the distortion within d ^ 2 .
(2)
Collect the indicators to form a combined code ( I D ) 10 = ( I 1 , I 2 , , I B 1 ) 2 . The combined code is computed by
I D = i = 1 B 1 2 i 1 I i
(3)
Embed the combined code I D in the pixel B K B
B K B = B K B + I D 2 , and
B K B = B K B I D 2
Step 8:
Repeat Step 6 until all blocks have been processed.
Figure 11 shows an example to illustrate the embedding process. Figure 11a is a secret string with 24 secret bits. Let K = 3, and the first three secret bits “110” are transformed into a decimal digit d = i = 1 3 2 i 1 s i = 2 1 1 × 1 + 2 2 1 × 1 + 2 3 1 × 0 = 6 . The scheme maps the decimal digit d to the mapping table as shown in Table 4 to obtain the re-encoded code pair ( I 1 , d ^ 1 ) = (0, −1). The transformation of the other secret bits follows the same procedure described above.
Assume a cover image is divided into several blocks sized B = 3. Each block can be used to hide ( B 1 ) = ( 3 1 ) = 2 code pairs. In Figure 11a, the code pairs are { ( I 1 , d ^ 1 ) , ( I 2 , d ^ 2 ) } = { ( 0 , 1 ) , ( 1 , 1 ) } . Figure 8b shows a cover image. The first block is B K = { 105 ,   149 , 132   } . The reduced digits d ^ 1 = 1 and d ^ 2 = 1 are concealed into B K 1 = 105 and B K 2 = 149 , respectively. The stego-pixels of the first cover pixel B K 1 = 105 are computed by B K 1 = B K 1 + 1 2 = 105 + ( 1 ) = 104 and B K 1 = B K 1 1 2 = 105 0 = 105 . The stego-pixels of the second cover pixel B K 2 = 149 are computed by B K 2 = 149 + 1 2 = 149 and B K 2 = 149 1 2 = 148 . Then, the scheme collects the indicators to form a combined code I D = ( I 1   I 2 ) 2 = ( 01 ) 2 = ( 1 ) 10 . The combined code is embedded in the pixel B K B = 132 by B K 3 = B K 3 + 1 2 = 132 + 0 = 132 and B K 3 = B K 3 1 2 = 132 1 = 131 . Two stego-blocks are shown in Figure 11b.
The embedding procedure is executed repeatedly until all code pairs are embedded. The final stego-images, along with the mapping table, are sent to the receiver for extraction and recovery.

3.2. Overflow/Underflow Problem

In the embedding process, an underflow/overflow problem might occur as a result of the reduced code. For example, if the pixel is B K i = 254 and d ^ 2 = 3, then the two together would cause the overflow problem. In the proposed scheme, the range of d ^ is [−2K−2, 2K−2 − 1]. If a pixel is larger than 255 − (2K−2 − 1) = 256 − 2K−2, then the overflow problem might occur because of the addition of 2K−2 − 1. If a pixel that is less than 2K−2, then it might cause the underflow problem because of the addition of −2K−2. For example, assume K = 4, and the range of d ^ is [−4, 3]. Suppose that B K i = 0, d ^ = 3, and d ^ 2 = 3 2 = 2. Then, the stego-pixel is B K i d ^ 2 = −2, and there is an underflow problem.
Hence, the embeddable pixel is defined as being in the range of 2K−2 and 256 − 2K−2. In the embedding process, the proposed scheme determines whether the pixel B K i is in the range of [2K−2, 256 − 2K−2] or not. If the pixel is within the range, then it could be classified into a block. However, the pixel might cause an underflow/overflow problem and the pixel is non-embeddable. For the non-embeddable pixel, the stego-pixels are set to equal the value of the original pixels. For example, assume that K = 4 and a pixel in the range of [24−2, 256 − 24−2] = [4, 252] is embeddable. In Figure 12, the pixel 254 is out of the range, which means it is non-embeddable. The stego-pixels are set to equal its original pixel. The next pixels 132 and 105 are embeddable. However, the next pixel 2 is non-embeddable and cannot be classified into a block. So, the next pixel 250 is gathered with pixels 132 and 105 to form block B K = { 132 , 105 , 250 } , and the embedding process is performed.

3.3. Extraction and Recovery

In this section, we describe the extraction and recovery processes by which re-encoded reduced digits and secret bits are extracted from the stego-image as well as the process of cover image recovery. There are ( B 1 ) code pairs concealed in an embeddable block. Hence, the receiver divides the stego-images into several blocks the size of B. The re-encoded reduced digits d ^ can be extracted by computing the differences between two stego-pixels, where   d ^ i   = B K i B K i and 1 i B 1 . The combined code is extracted from the last pixels of the stego-blocks by   I D   = B K B B K B . Then, the receiver transforms the combined code   I D   into ( B 1 ) binary bits. Each bit represents an indicator I i . One indicator I i along with one re-encoded reduced digit d ^ i forms the code pair ( I i , d ^ i   ). After the code pair is obtained, it is then mapped to the mapping table to obtain the original decimal digit d . Each decimal digit d is transformed into K secret bits.
In the recovery process, the cover pixel B K i can be recovered by the average between two stego-pixels, i.e., B K i = B K i + B K i 2 . Figure 13 shows the data extraction and recovery procedure of the proposed method.
Following the same example presented in Figure 11b. The stego-blocks are B K = { 104 ,   149 ,   132 } and B K = { 105 , 148 , 131 } . The re-encoded reduced codes are   d ^ 1   = B K 1 B K 1 = 104 105 = 1 and   d ^ 2   = B K 2 B K 2 = 149 148 = 1 , and the combined code is   I D   = B K 3 B K 3 = 132 131 = 1 . The combined code is transformed into ( 3 1 ) = 2 binary bits I D = ( 01 ) 2 , where I 1 = 0 and I 2 = 1 . The code pairs are ( I 1 , d ^ 1   ) = (0, −1) and ( I 2 , d ^ 2   ) = (1, 1). The original decimal digits d = 6 and d = 3 and can be derived by mapping them into the mapping table as shown in Figure 11a. Finally, the decimal digits d = 6 and d = 3 are transformed into three secret bits, i.e., “110” and “011”. Furthermore, the original pixel can be recovered by the average between B K i and B K i , i.e., B K 1 = B K 1 + B K 1 2 = 104 + 105 2 = 105 , B K 2 = 149 + 148 2 = 149 , and B K 3 = 132 + 131 2 = 132 .
In the extraction process, the proposed scheme determines whether the two stego-pixels are both outside the range [2K−2, 256 − 22−1]. If so, then the pixels are non-embeddable. If the two stego-pixels are not equal and more than one pixel is within the range, then the pixels are embeddable and data are concealed within. The secret information can be extracted, and the pixels can be restored following the extraction procedure.

3.4. Re-Encoding of the Combined Code

In the embedding process, the combined code is used to indicate the number of sub-bands of the re-encoded code. The value range of I D is [0, 2(B−1) −1]. For example, assume that the block size is set to be B = 5. The value range of I D is [0, 2(5−1) −1] = [0, 15]. The maximum value of the range is 15. The value is directly added to the last pixel of the block to generate the stego-pixel. However, if the maximum value occurrence frequency is high, then directly embedding it in the pixel will decrease the visual quality. Therefore, the proposed scheme selectively re-encodes the combined code according to its occurrence frequency and generates a mapping table to record the relationship between the combined code and the re-encoded combined code. The re-encoding procedure is the same as the re-encoding procedure of the reduced code.

4. Results

In the proposed scheme, the block size B and the hiding bit K are key factors that influence the hiding performance. To find out proper values of B and K, eight schemes with different values are implemented. They are
  • BlockFolding (B = 3, K = 3, RE = 0), BlockFolding (B = 3, K = 3, RE = 1),
  • BlockFolding (B = 3, K = 4, RE = 0), BlockFolding (B = 3, K = 4, RE = 1),
  • BlockFolding (B = 5, K = 3, RE = 0), BlockFolding (B = 5, K = 3, RE = 1),
  • BlockFolding (B = 5, K = 4, RE = 0), and BlockFolding (B = 5, K = 4, RE = 1).
The parameters B and K are the block size and the hiding bits, respectively. The parameter RE indicates whether the combined code is re-encoded or not. RE = 0 means the combined code is the original value without re-encoding. In contrast, RE = 1 means the combined code is re-encoded according to its occurrence frequency.
Five related methods are also implemented for a comparison with the proposed schemes. These are Lee’s dual steganographic scheme (Lee2009), Lee’s orientation combination scheme (Lee2013), Chang’s magic matrix scheme (Chang2013), Lu et al.’s center-folding scheme (Lu2015), and Lu’s scheme without the center-folding strategy (NonFolding).
Two measurements are used to measure the performance of the hiding methods, the embedding rate and the image quality. The embedding rate R is calculated by
R = C E 2 × h × w · ( bpp ) ,
where C is the total hiding capacity of the two stego-images, E is the size of the mapping table, and h × w is the size of the image. A high embedding rate means that the proposed scheme has great embedding ability.
Image quality is calculated by using the PSNR given by
PSNR _ z = 10 × log 10 255 2 MSE _ z · ( dB ) ,
where PSNR _ z is the PSNR value of the zth stego-image, dB represents the decibels, and MSE _ z is the mean squared error between the cover image and the stego-image, and is obtained by
MSE = 1 h w ( P P ) 2 ,
where P is the cover pixel and P is the stego-image.
The PSNR values in the experimental results are the average values of all PSNR _ z , which can be computed by
PSNR _ avg = 1 z PSNR _ z · ( dB )
In general, it is very difficult to determine the difference between the cover image and the stego-image by human eyes when the PSNR value is greater than 30 dB.
Six grayscale images were used to test the hiding performance. Figure 14 shows the images Lena, Mandrill, Airplane, Peppers, Lake, and Tiffany. The size of the image is 512   ×   512. Four secret images, namely, random (512   ×   512), Dolphin (375   ×   352), Brain (420   ×   315), and TiffanySec (512   ×   512) are shown in Figure 15.
In the first experiment, we tested the performance of the proposed scheme with various B, K, and RE. Figure 16 shows the experimental results. “BlockFolding” is the proposed scheme. Under the same embedding rate, BlockFolding (B = 3, K = 3, RE = 0) can achieve the highest image quality. BlockFolding (B = 5, K = 4, RE = 1) can get the highest hiding payload. When B = 3 and K = 3, the image quality with RE = 0 is higher than that with RE = 1. However, when B = 5 and K = 4, the image quality with RE = 1 is higher than that with RE = 0. The reason is that if the block size is small, then the combined code is small enough that it does not need to be re-encoded. However, for a block with a large size, the combined code is usually large enough that it needs to be re-encoded. For example, if the value range of the combined code with B = 5 is [0, 2(5−1) − 1] = [0, 15], the maximum value 15 will cause great image distortion. The re-encoding process can effectively narrow down the distortion.
To compare for a comparison of the proposed scheme with other related methods, the value of B is set to 3 and 5, the value of K is set to 3 and 4, and RE is set to be 0 and 1. Table 5, Table 6, Table 7 and Table 8 show the results of the comparison among the proposed scheme and the related works with the cover image Lena and the secret images random, TiffanySec, Dolphin, and Brain, respectively.
In Table 5, with the secret image “random”, the PSNR_avg of the proposed scheme with B = 5, K = 4, and RE = 1 for the cover image Lena is 53.46 dB, which is greater than the value of 43.98 dB for Lu2015. The image quality of the proposed scheme is higher than the value of 9.48 dB obtained by Lu’s scheme. At the same time, the hiding rate of the proposed scheme is 1.61 bpp, which is higher than that of Lu2015’s 0.11 bpp. Under the same hiding capacity, the image quality of the proposed scheme with B = 3, K = 3, and RE = 0 is 55.99 dB, which is higher than that of Lee2013’s 51.63 dB. Although Lu2015 with K = 4 achieves the highest hiding rate, 2.0 bpp, the image quality of Lu2015 is decreased to 39.65 dB.
In Table 6, although Lee2009 has highest image quality 52.90 dB, the hiding rate of Lee2009 is only 0.72 dB. The results for different secret images have the same situation.
In Table 8, for the secret image Brain, the image quality obtained by Lee2009 is the highest. However, its hiding capacity is 0.53 bpp, which is the lowest among all results obtained by other methods. The proposed scheme with B = 3, K = 3, and RE = 0 has the same hiding payloads as those of Lee2013. The image quality of the proposed scheme is 58.73 dB, which is greater than that of the other methods, thereby indicating that the proposed scheme still exhibits better embedding performance compared with the others.
From the results of the experiment, we can see that the proposed scheme with a small block size B = 3 achieves a higher image quality. Because the combined code in the small block size is small, the code does not need to be re-encoded where RE = 0. In contrast, the proposed scheme with a large block size B = 5 has a higher hiding capacity. The combined code in a large block size needs to be re-encoded, as the value of the code is usually very large. Hence, RE is set to be RE = 1 for B = 5.
The second experiment compared the proposed scheme with the other methods. Figure 17 shows the comparison among all five related methods and the proposed scheme in terms of embedding rate and PSNR value. Figure 17 shows that the image quality of BlockFolding (B = 3, K = 3, RE = 0) is higher than those of the other methods. Under the same embedding rate, the proposed method can achieve a greater PSNR value than the related methods. The hiding capacity of BlockFolding (B = 5, K = 4, RE = 1) is higher than those of the other methods.
The third experiment was aimed at proving the viability of the proposed scheme. Several steganalysis techniques such as histogram steganalysis, RS steganalysis, primary sets, Chi square, sample pairs, RS analysis, and fusion detection were used to test the performance of the proposed scheme. The histogram steganalysis method compares the shapes between the cover image and the stego-image to detect whether there is a concealed message.
Figure 18 shows histogram comparisons of Lena with different parameters. The curve starting with the symbol “*” is the histogram of the stego-image. We can see that the shape of the stego-image is almost the same as that of the cover image.
RS steganalysis is a kind of attack method proposed by Fridrich et al. In the method, pixels are classified into several groups. The method uses a discrimination function to quantify smoothness or regularity and uses a flipping function to define three groups, regular (R), singular (S), and unusable (U). The percentages of each group with mask M = [1 0 0 1] and −M = [−1 0 0 −1] are represented as R_M_G, R_FM_G, S_M_G, S_FM_G, U_M_G, and U_FM_G, respectively. The hypotheses are R_M_G R_FM_G, S_M_G S_FM_G, and U_M_G U_FM_G. Figure 19 shows the RS steganalysis results for Lena with different parameters. In the figures, the curve of R_M_G is very similar to that of R_FM_G. The method judges there is no secret message hidden in the image. The curves of S_M_G, S_FM_G, U_M_G, and U_FM_G have the same situations. Hence, the proposed scheme cannot be detected by the RS steganalysis.
Other tests including primary sets, Chi square, sample pairs, RS analysis, and fusion detection were applied to examine the proposed scheme. Table 9 shows the experiment report. All numbers in the table are very small, which means the proposed scheme is robust against the steganalytic attacks.

5. Conclusions

The dual-image-based hiding scheme is a new technology in the data hiding field. The concept of dual-image, based on information sharing, consists of concealing secret messages in two of the same cover images; only someone who has both stego-images can extract the secret messages. There are many advantages to using dual-image in data hiding, such as its high payload, reversibility, and strong robustness.
The proposed method improves Lu’s center-folding strategy by including the folding operation twice and using an indicator to identify the second folding operation as a means of distinguishing different sub-bands to further decrease the reduced digit. In addition, the proposed method effectively solves the overflow/underflow problem.
In order to evaluate the performance of the proposed scheme, eight schemes with different B and K values were implemented. Moreover, five related methods were implemented for a comparison with the proposed scheme. The first experiment showed that a small B value achieves higher image quality, a large K value achieves a large payload, and the re-encoding process can effectively narrow down the distortion when B is larger. The second experiment compared the proposed and related methods. The results showed that the proposed scheme can achieve higher image quality (B = 3, K = 3, RE = 0), better image quality under the same embedding rate, and a higher payload than other schemes (B = 5, K = 4, RE = 1). The third experiment used several steganalysis techniques to prove the strong robustness of the proposed scheme, include histogram steganalysis, RS steganalysis, primary sets, Chi square, sample pairs RS analysis, and fusion detection.

Acknowledgments

This study was financially supported by a research grant from Taiwan’s Ministry of Science and Technology (MOST 105-2221-E- 324-020).

Author Contributions

Tzu-Chuen Lu designed the algorithm, conducted all experiments, analyzed the results, wrote the manuscript, and conducted the literature review. Hui-Shih Leng conceived the algorithm and wrote the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett. 2006, 13, 285–287. [Google Scholar] [CrossRef]
  2. Wu, D.-C.; Tsai, W.-H. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 2003, 24, 1613–1626. [Google Scholar] [CrossRef]
  3. Chang, C.C.; Tseng, H.W. A steganographic method for digital images using side match. Pattern Recognit. Lett. 2004, 25, 1431–1437. [Google Scholar] [CrossRef]
  4. Zhang, X.; Wang, S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 2006, 10, 781–783. [Google Scholar] [CrossRef]
  5. Kieu, T.D.; Chang, C.C. A steganographic scheme by fully exploiting modification directions. Expert Syst. Appl. 2011, 38, 10648–10657. [Google Scholar] [CrossRef]
  6. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  7. Alattar, A. Reversible watermarks using a difference expansion. In Internet and Communications Multimedia Security Handbook; Furht, B., Kirovski, D., Eds.; CRC Press: Boca Raton, FL, USA, 2004. [Google Scholar]
  8. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef]
  9. Li, X.; Yang, B.; Zeng, T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 2011, 20, 3524–3533. [Google Scholar] [PubMed]
  10. Gui, X.; Li, X.; Yang, B. A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 2014, 98, 370–380. [Google Scholar] [CrossRef]
  11. Li, X.; Li, J.; Li, B.; Yang, B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
  12. Peng, F.; Li, X.; Yang, B. Improved PVO-based reversible data hiding. Digit. Signal Process. 2014, 25, 255–265. [Google Scholar] [CrossRef]
  13. Qu, X.; Kim, H.J. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 2015, 111, 249–260. [Google Scholar] [CrossRef]
  14. Wang, X.; Ding, J.; Pei, Q. A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 2015, 310, 16–35. [Google Scholar] [CrossRef]
  15. Chang, C.C.; Kieu, T.D.; Chou, Y.C. Reversible data hiding scheme using two steganographic images. In Proceedings of the 2007 IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, 30 Ocotber–2 November 2007; pp. 1–4. [Google Scholar]
  16. Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A reversible data hiding scheme based on dual steganographic images. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC ’09), Suwon, Korea, 15–16 January 2009; pp. 228–237. [Google Scholar]
  17. Lee, C.F.; Huang, Y.L. Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 2013, 52, 2237–2247. [Google Scholar] [CrossRef]
  18. Chang, C.C.; Lu, T.C.; Horng, G.; Huang, Y.H.; Hsu, Y.M. A high payload data embedding scheme using dual stego-images with reversibility. In Proceedings of the 2013 9th International Conference on Information, Communications and Signal Processing, Tainan, Taiwan, 10–13 December 2013; pp. 1–5. [Google Scholar]
  19. Qin, C.; Chang, C.C.; Hsu, T.J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 2014, 74, 5861–5872. [Google Scholar] [CrossRef]
  20. Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 2015, 108, 77–89. [Google Scholar] [CrossRef]
  21. Lu, T.C.; Wu, J.H.; Huang, C.C. Dual-image-based reversible data hiding method using center folding strategy. Signal Process. 2015, 115, 195–213. [Google Scholar] [CrossRef]
  22. Lu, T.C.; Chi, L.P.; Wu, C.H.; Chang, H.P. Reversible data hiding in dual stego-images using frequency-based encoding strategy. Multimed. Tools Appl. 2016. [Google Scholar] [CrossRef]
  23. Fridrich, J.; Golijan, M.; Du, R. Reliable detection of LSB steganography in grayscale and color images. In Proceedings of the 2001 Workshop on Multimedia and Security, Ottawa, ON, Canada, 5 October 2001; pp. 27–30. [Google Scholar]
  24. Boehm, B. StegExpose—A Steganalysis Tool for Detecting LSB Steganography in Images. Available online: http://arxiv.org/abs/1410.6656 (accessed on 19 September 2017).
Figure 1. Diagram of the information hiding process.
Figure 1. Diagram of the information hiding process.
Symmetry 09 00223 g001
Figure 2. Information hiding categories. LSB: least significant bit substitution method, PVD: the pixel-value differencing method, EMD: the exploiting modification direction method, DE: difference expansion, HS: histogram shifting, PVO: pixel-value ordering method.
Figure 2. Information hiding categories. LSB: least significant bit substitution method, PVD: the pixel-value differencing method, EMD: the exploiting modification direction method, DE: difference expansion, HS: histogram shifting, PVO: pixel-value ordering method.
Symmetry 09 00223 g002
Figure 3. Dual-image based hiding scheme. (a) Embed secret messages into two of the same cover images; (b) Extract secret messages from the two stego-images.
Figure 3. Dual-image based hiding scheme. (a) Embed secret messages into two of the same cover images; (b) Extract secret messages from the two stego-images.
Symmetry 09 00223 g003
Figure 4. Direction-based embedding rules.
Figure 4. Direction-based embedding rules.
Symmetry 09 00223 g004
Figure 5. Data embedding method using five directions.
Figure 5. Data embedding method using five directions.
Symmetry 09 00223 g005
Figure 6. Example value range of the central-folding strategy with K = 3.
Figure 6. Example value range of the central-folding strategy with K = 3.
Symmetry 09 00223 g006
Figure 7. Diagram of Lu’s center-folding strategy.
Figure 7. Diagram of Lu’s center-folding strategy.
Symmetry 09 00223 g007
Figure 8. Diagram of the proposed block folding technique.
Figure 8. Diagram of the proposed block folding technique.
Symmetry 09 00223 g008
Figure 9. Information hiding diagram of the proposed scheme.
Figure 9. Information hiding diagram of the proposed scheme.
Symmetry 09 00223 g009
Figure 10. Diagram of the averaging embedding method.
Figure 10. Diagram of the averaging embedding method.
Symmetry 09 00223 g010
Figure 11. Example of the proposed method. (a) Secret encoding; (b) Embedding example.
Figure 11. Example of the proposed method. (a) Secret encoding; (b) Embedding example.
Symmetry 09 00223 g011
Figure 12. Example of a block with three embeddable pixels.
Figure 12. Example of a block with three embeddable pixels.
Symmetry 09 00223 g012
Figure 13. Diagram of the extraction and recovery processes.
Figure 13. Diagram of the extraction and recovery processes.
Symmetry 09 00223 g013
Figure 14. Six test images.
Figure 14. Six test images.
Symmetry 09 00223 g014
Figure 15. Four secret images.
Figure 15. Four secret images.
Symmetry 09 00223 g015
Figure 16. Results of the first experiment.
Figure 16. Results of the first experiment.
Symmetry 09 00223 g016aSymmetry 09 00223 g016bSymmetry 09 00223 g016c
Figure 17. Comparison of the proposed and related methods.
Figure 17. Comparison of the proposed and related methods.
Symmetry 09 00223 g017aSymmetry 09 00223 g017b
Figure 18. Histogram steganalysis of Lena with different parameters.
Figure 18. Histogram steganalysis of Lena with different parameters.
Symmetry 09 00223 g018
Figure 19. RS-diagram steganalysis of Lena with the secret image “random”.
Figure 19. RS-diagram steganalysis of Lena with the secret image “random”.
Symmetry 09 00223 g019
Table 1. Example of the frequency-based encoding table (K = 3).
Table 1. Example of the frequency-based encoding table (K = 3).
Decimal DigitReduced DigitOccurrence FrequencyOrderIndices
0−405−3
1−3063
2−2121
3−121−1
40074
5113−2
62142
73300
Table 2. Example code pairs of Figure 6 with K = 3.
Table 2. Example code pairs of Figure 6 with K = 3.
d 01234567
I 00001111
d ^ −2−101−2−101
( I , d ^ ) (0, −2)(0, −1)(0, 0)(0, 1)(1, −2)(1, −1)(1, 0)(1, 1)
Table 3. The re-encoded code pairs of Table 2.
Table 3. The re-encoded code pairs of Table 2.
O ( d ) 01234567
I 00011001
d ^ 0−11−11−22−2
( I , d ^ ) (0, 0)(0, −1)(0, 1)(1, −1)(1, 1)(0, −2)(0, 2)(1, −2)
Table 4. Example mapping table with K = 3.
Table 4. Example mapping table with K = 3.
d F ( d ) O ( d ) I d ^ ( I , d ^ )
0787,558101(0, 1)
190,362502(0, 2)
233,713712(1, 2)
390,853311(1, 1)
490,36241−1(1, −1)
534,20360−2(0, −2)
690,85320−1(0, −1)
7879,232000(0, 0)
Table 5. Experiment results for the secret image “random”.
Table 5. Experiment results for the secret image “random”.
MethodBKREPSNR_1PSNR_2PSNR_avgCapacity R Time
BlockFolding33059.9852.0055.99525,3121.006.99
33159.0452.5255.78525,3121.006.99
34057.3051.3454.32700,4161.346.96
34156.9551.5754.26700,4161.346.96
53050.9548.6549.80632,8321.214.65
53158.1351.1554.64632,8321.214.65
54051.6448.7950.21843,7761.614.80
54156.2850.6553.46843,7761.614.80
Lu2015 3 45.0242.9443.98786,4321.502.41
4 39.6539.6539.651,048,5762.002.60
NonFolding 3 41.6939.3540.52786,4321.502.41
Lee2009 4 51.1453.7652.45405,4980.771.13
Lee2013 4 50.9752.2951.63524,2881.001.15
Chang2013 4 39.8939.8939.89786,4321.501.54
Table 6. Experiment results for the secret image Tiffany.
Table 6. Experiment results for the secret image Tiffany.
MethodBKREPSNR_1PSNR_2PSNR_avgCapacity R Time
BlockFolding33055.3749.7952.58525,3121.007.02
33153.5150.8152.16525,3121.007.02
34050.6247.7949.21700,4161.347.47
34147.7945.6646.72700,4161.347.47
53046.3144.5745.44632,8321.214.89
53151.5548.8850.22632,8321.214.89
54043.8442.6943.26843,7761.614.99
54149.4847.5048.49843,7761.614.99
Lu2015 3 49.6546.7648.20786,4321.502.57
4 42.1742.1742.171,048,5762.002.74
NonFolding 3 41.9339.8040.87786,4321.502.57
Lee2009 4 51.1454.6552.90378,9800.721.27
Lee2013 4 50.6949.3950.04524,2881.001.28
Chang2013 4 39.8939.8939.89786,4321.501.79
Table 7. Experiment results for the secret image Dolphin.
Table 7. Experiment results for the secret image Dolphin.
MethodBKREPSNR_1PSNR_2PSNR_avgCapacity R Time
BlockFolding33056.9853.1655.07525,3121.007.27
33155.5353.1654.34525,3121.007.27
34051.8148.9250.37700,4161.347.49
34151.0848.7849.93700,4161.347.49
53046.9546.0646.50632,8321.215.02
53153.5651.1752.36632,8321.215.02
54045.4744.2044.83843,7761.615.06
54149.1947.3848.28843,7761.615.06
Lu2015 3 47.2143.6645.44786,4321.502.65
4 42.1442.1442.141,048,5762.002.75
NonFolding 3 40.6438.3039.47786,4321.502.65
Lee2009 4 51.1452.0951.62472,8000.901.23
Lee2013 4 49.1050.8649.98524,2881.001.21
Chang2013 4 39.8939.8939.89786,4321.501.63
Table 8. Experiment results for the secret image Brain.
Table 8. Experiment results for the secret image Brain.
MethodBKREPSNR_1PSNR_2PSNR_avgCapacity R Time
BlockFolding33061.7658.7360.24525,3121.006.85
33161.0359.5060.26525,3121.006.85
34050.5748.3149.44700,4161.347.01
34147.6346.0146.82700,4161.347.01
53051.5850.6451.11632,8321.214.64
53157.3255.4656.39632,8321.214.64
54043.8942.8943.39843,7761.614.88
54148.3846.9047.64843,7761.614.88
Lu2015 3 43.1142.9143.01786,4321.502.59
4 36.9536.9536.951,048,5762.002.99
NonFolding 3 48.3046.3347.31786,4321.502.59
Lee2009 4 51.1463.7057.42276,6960.531.26
Lee2013 4 60.8459.3560.09524,2881.001.17
Chang2013 4 39.8739.8739.87786,4321.501.55
Table 9. Steganalysis report for StegExpose.
Table 9. Steganalysis report for StegExpose.
CoverBKStegoPrimary SetsChi SquareSample PairsRS AnalysisFusion (Mean)
Airplane34Stego 10.0276750.0042890.0307030.0246260.021823
Stego 20.0223050.0059630.0291860.0177870.018810
53Stego 10.0193420.0049480.0273520.0207100.018088
Stego 20.0136020.0052690.0186270.0175530.013763
54Stego 10.0196240.0055670.0228170.0166580.016166
Stego 20.0244430.0048440.0202660.0155730.016282
Lake34Stego 10.0506970.0000000.0044560.0274770.020658
Stego 20.0311110.0000290.0250460.0442350.025105
53Stego 10.0414290.0000000.0219960.0287850.023052
Stego 20.0423430.0000030.0312230.0252380.024702
54Stego 10.0433500.0000000.0151910.0190250.019392
Stego 20.0319050.0000030.0279850.0302180.022528
Lena34Stego 10.0056930.0012960.0191930.0056860.007967
Stego 20.0145980.0012670.0160120.0066160.009623
53Stego 10.0093560.0012710.0151010.0102880.009004
Stego 20.0364240.0011030.0283640.0135550.019861
54Stego 10.0019980.0012750.0124010.0070160.005673
Stego 20.0195150.0011210.0113690.0082650.010068
Mandrill34Stego 10.0540840.0014490.0923570.0850730.058241
Stego 20.0464090.0015830.0831330.1084570.059895
53Stego 10.0710360.0010790.1258270.1150840.078256
Stego 20.0776010.0021460.1071020.0995200.071592
54Stego 10.0758380.0011450.1230480.0963510.074096
Stego 20.0534530.0024190.0907630.0870100.058411
Pepper34Stego 10.0807490.0029560.0559240.0608410.050117
Stego 20.0587200.0029170.0514640.0719260.046257
53Stego 10.1048120.0023550.0760680.0639530.061797
Stego 20.0248760.0021410.0274760.0597400.028558
54Stego 10.0931480.0031510.0654320.0548710.054151
Stego 20.0830260.0028940.0574480.0635650.051734
Tiffany34Stego 10.0458270.0052670.0442560.0460800.035357
Stego 20.0387650.0054640.0431390.0401020.031868
53Stego 10.0368110.0054540.0367310.0406660.029915
Stego 20.0208020.0052700.0217870.0332470.020276
54Stego 10.0441590.0052900.0430030.0427460.033799
Stego 20.0470080.0056010.0420990.0337120.032105

Share and Cite

MDPI and ACS Style

Lu, T.-C.; Leng, H.-S. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique. Symmetry 2017, 9, 223. https://doi.org/10.3390/sym9100223

AMA Style

Lu T-C, Leng H-S. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique. Symmetry. 2017; 9(10):223. https://doi.org/10.3390/sym9100223

Chicago/Turabian Style

Lu, Tzu-Chuen, and Hui-Shih Leng. 2017. "Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique" Symmetry 9, no. 10: 223. https://doi.org/10.3390/sym9100223

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop