Advertisement

Journal of Real-Time Image Processing

, Volume 16, Issue 3, pp 673–684 | Cite as

A real-time dual-image-based reversible data hiding scheme using turtle shells

  • Jiang-Yi Lin
  • Yanjun LiuEmail author
  • Chin-Chen Chang
Special Issue Paper
  • 101 Downloads

Abstract

In this paper, we propose a novel real-time dual-image-based reversible data hiding (RDH) scheme using turtle shells (TS) which decomposes and hides secret data into two shadows. After constructing a novelly designed TS-based reference matrix, one secret bit is concealed in the first shadow and four secret bits are embedded in the second shadow. According to the orientation relationship of the pixel pairs selected from the two shadows, the hidden secret data and the cover image can be extracted and restored without errors. In the experiment, the proposed scheme achieved higher embedding capacity and maintained better visual quality than some state-of-the-art dual-image-based schemes. Meanwhile, according to the lower computational complexity of the proposed scheme, it is suitable for diverse real-time applications. In addition, the proposed scheme has good performance on resisting static attacks on pixel-value differencing (PVD) histogram.

Keywords

Reversible data hiding (RDH) Turtle shell (TS) Dual-image Reference matrix Real time 

Notes

Acknowledgements

This work is partially supported by the Science and Technology Project of Xiamen (Grant number: JT180439) and the Natural Science Foundation of Fujian Province (Grant number: 2018J01572).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. 1.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Hu, Y.C.: High capacity image hiding scheme based on vector quantization. Pattern Recogn. 39(9), 1715–1724 (2006)CrossRefzbMATHGoogle Scholar
  3. 3.
    Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sudoku. In: Proceedings of Third International Conference on Innovative Computing, Information and Control, Dalian, China, pp. 17–22, June: 2008Google Scholar
  4. 4.
    Kim, H.J., Kim, C., Choi, Y., Wang, S., Zhang, X.: Improved modification direction schemes. Comput. Math. Appl. 60(2), 319–325 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Chang, C.C., Liu, Y.J., Nguyen, T.S.: A novel turtle shell based scheme for data hiding. In: Proceedings of Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, pp. 89–93, August 2014Google Scholar
  6. 6.
    Liu, Y.J., Chang, C.C., Nguyen, T.S.: High capacity turtle shell-based data hiding. IET Image Process. 10(2) 130–137, (2016)CrossRefGoogle Scholar
  7. 7.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  8. 8.
    Chang, C.C., Yu, Y.H., Hu, Y.C.: Hiding secret data in images via predictive coding. Pattern Recogn. 38(5), 691–705 (2005)CrossRefGoogle Scholar
  9. 9.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  10. 10.
    Chang, C.C., Wu, W.C., Hu, Y.C.: Lossless recovery of a VQ index table with embedded secret data. J. Vis. Commun. Image Represent. 18(3), 207–216 (2007)CrossRefGoogle Scholar
  11. 11.
    Tsai, P.Y., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Sig. Process. 89(6), 1129–1143 (2009)CrossRefzbMATHGoogle Scholar
  12. 12.
    Chang, I.C., Hu, Y.C., Chen, W.L., Lo, C.C.: High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Sig. Process. 108, 376–388, (2015)CrossRefGoogle Scholar
  13. 13.
    Qin, C., Hu, Y.C.: Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Sig. Process. 129, 48–55 (2016)CrossRefGoogle Scholar
  14. 14.
    Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Sig. Process. 138, 280–293 (2017)CrossRefGoogle Scholar
  15. 15.
    Qin, C., Chen, X., Luo, X., Zhang, X., Sun, X.: Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423, 284–302 (2018)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. 25(3), 36–48 (2018)CrossRefGoogle Scholar
  17. 17.
    Tao, J., Li, S., Zhang, X., Wang, Z.: Towards robust image steganography. IEEE Trans. Circuits Syst. Video Technol.  https://doi.org/10.1109/TCSVT.2018.2881118
  18. 18.
    Li, S., Zhang, X.: Toward construction based data hiding: from secrets to fingerprint images. IEEE Trans. Image Process. 28(3), 1482–1497 (2019)MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible data hiding scheme using two steganographic images. In: Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, pp. 1–4, October 2007Google Scholar
  20. 20.
    Chang, C.C., Chou, Y.C., Kieu, T.D.: Information hiding in dual images with reversibility. In: Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, pp. 145–152, June 2009Google Scholar
  21. 21.
    Lee, C.F., Wang, K.H., Chang, C.C., Huang, Y.L.: A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 228–237, January 2009Google Scholar
  22. 22.
    Lee, C.F., Huang, Y.L.: Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst 52(4), 2237–2247 (2013)CrossRefGoogle Scholar
  23. 23.
    Chang, C.C., Lu, T.C., Horng, G., Huang, Y.H., Hsu, Y.M.: A high payload data embedding scheme using dual stego-images with reversibility. In: Proceedings of the Third International Conference on Information, Communications and Signal Processing, Tainan, Taiwan, pp. 1–5, December 2013Google Scholar
  24. 24.
    Qin, C., Chang, C.C., Hsu, T.J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 74(15), 5861–5872 (2015)CrossRefGoogle Scholar
  25. 25.
    Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sudoku. In: Proceedings of The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), Dalian, China, pp. 17–21, June 2008Google Scholar
  26. 26.
    Chang, C.C., Lin, P.Y., Wang, Z.H., Li, M.C.: A Sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1), 5–12 (2010)CrossRefGoogle Scholar
  27. 27.
    Wang, Z.H., Guo, C., Chang, C.C.: “A novel (n, n) secret image sharing scheme based on Sudoku,” J. Electron. Sci. Technol. 11(1), 44–50, (2013)Google Scholar
  28. 28.
    Huynh, N.T., Bharanitharan, K., Chang, C.C.: Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J. Vis. Commun. Image Represent. 28, 105–112 (2015)CrossRefGoogle Scholar
  29. 29.
    Liu, Y.J., Chang, C.C.: A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed. Tools Appl. 77(19), 25295–25310 (2018)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer and Information EngineeringXiamen University of TechnologyXiamenChina
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungRepublic of China

Personalised recommendations