Next Article in Journal
Safety Evaluation Method and Management Strategy for Aviation Flight Plans
Previous Article in Journal
Hybrid Algorithms for Inbound and Outbound Truck Scheduling in Cross-Docking Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique

Department of Information Systems Engineering, Kocaeli University, 41001 Kocaeli, Turkey
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(21), 10933; https://doi.org/10.3390/app122110933
Submission received: 30 September 2022 / Revised: 21 October 2022 / Accepted: 25 October 2022 / Published: 28 October 2022

Abstract

:
In this article, a new reversible data hiding method using most significant bits and center shifting technique in dual images is proposed. The proposed reversible data hiding method aims to securely hide high-capacity secret data. Instead of directly embedding the secret data, the method calculates new values with (n + 1) bits secret data and the n most significant bits of the cover image pixel values. Thus, it is impossible to extract secret data without obtaining the original cover image. Also, the center shifting process is performed to minimize the mean square error. After this process, the secret data to be hidden in the dual images are in the range [ 3 × 2 ( n 1 ) + 1 ,   3 × 2 ( n 1 ) 1 ] . The pixel values of stego images are obtained by using the secret data in this range value and cover image pixel values. As a result of experimental studies, when the payload is 2.5 bits per pixel (bpp), the peak signal-to-noise ratio value (PSNR), which expresses the visual quality, is above 34 (dB). In addition, the proposed method has proven secure against RS (regular and singular) analysis attacks.

1. Introduction

People generally exchange information on the internet using a computer and smart phone, since it provides easy and rapid communication in recent years. Malicious people may monitor illegally, steal, and disrupt this information during the transmission, thus it is an important topic to preserve data security and integrity. We utilize common cryptography [1] and steganography [2] techniques to provide the data security and integrity. While the cryptography encrypts the secret data in such a way that it has puzzling data to third parties, the steganography hides secret data unobtrusively in various files such as text, audio, image and video. In data hiding studies, selecting image files to embed data is known as image steganography. Image Steganography consists of the cover image, secret data, data embedding algorithm and the stego image [3,4,5]. The cover image indicates the carrier media used to hide secret data, while the stego image represents the result media containing the secret data and cover image [4]. In the algorithm studies of image steganography, it is expected that the cover and stego images are highly similar and the high embedding capacity [6,7]. Most studies in literature have focused only on retrieving secret data, not dealing with restoring the original image [8]. Steganography techniques involving such literature studies are called irreversible data hiding. In the techniques used in some literature studies, both the secret data and the original image must be recovered, which are called reversible data hiding (RDH) [9,10]. RDH methods have been popular in recent years for many reasons, such as security, capacity, and reversibility [11,12,13]. The most widely used RDH techniques are the difference expansion [14,15,16], histogram shifting [17,18,19,20], pixel value order [21], interpolation [22,23,24,25,26,27,28,29], and dual image [30,31,32,33,34,35,36,37,38] based methods.
The difference expansion method, known as the expansion of the difference between two non-overlapping pixels to hide a bit, was proposed by Tian in 2003 [14]. The payload (0.5 bpp) and visual quality of the stego image are low in this method and have the fall of boundary problem. Due to its low computational complexity, it can be preferred reversible methods to hide a small amount of data. There are many studies in the literature to increase the visual quality and payload in the method. Li et al. (2011) offered an adaptive data concealing method that separates pixel complexities into rough and flat parts. In addition, this study decided on the embedded pixel estimation error and the amount of embedded secret data according to diverse classification results [15]. Gui et al. (2014) developed the method of Li et al. (2011) by increasing the types of complexity to increase the embedding capacity of the prediction error [16].
The histogram shifting algorithm utilizes statistical techniques to create the histogram of pixel values or differences and embed the secret data at the highest value. Ni et al. (2006) concealed the secret data into the most frequently repeated pixels using the histogram shifting technique [17]. Tsai et al. (2009) suggested a histogram-based approach. To improve data embedding capacity, secret data are hidden in the residual images after linear prediction and used the pairs of peaks and zero points for extra capacity [18]. In the method proposed by Zhao et al. (2011), firstly, they created positive and negative difference histograms by using pixel differences with a linear estimation method. Then, the blank columns are obtained because of the shifting process on these histograms. And finally, they have implemented data hiding by distributing a zero-center range to these blank columns [19]. Wang et al. (2013) developed a new approach that produces two differences per pixel, first creating a two-dimensional histogram based on the differences and then reducing this histogram to several single dimensions for data hiding, aiming to achieve high embedding capacity [20].
Li et al. (2013) proposed a pixel value order-based data hiding method [21]. Their method’s aim is to reduce the number of shifted pixels and achieve high image quality. In the method, firstly, 2 × 2 blocks are taken from the cover image and the pixel values are ordered in descending. If the two largest values are equal to one, one bit data hiding is performed. If it is greater than one, the difference is increased by one. During data extraction, the difference of one or two indicates that it is hidden data, zero and one, respectively. During the recovery of the cover image, differences greater than one are reduced by one.
In interpolation-based methods, new expendable pixels are created by enlarging the size of the cover image. The embedding capacity is increased by the expansion process. Later, without changing the original pixel values, these expendable pixel values are changed and embedded secret data. Since the original pixel values are preserved, the cover image can be easily restored by combining the pixels in the correct positions. In addition, the initial values of intermediate pixels produced by interpolation can be recalculated over the original pixel values. Thanks to this process, the need to associate pixel values with each other in data hiding is eliminated [22,23,24,25,26,27,28,29].
In addition to these methods, dual image based reversible data hiding techniques are also widely used in the literature in recent years. These techniques create two identical duplicate images from a cover image to increase the overall embedding capacity while hiding secret data. Also, a dual image-based data hiding scheme can ensure higher data embedding capacity, more secure communication, and high visual quality. Because without obtaining two stego images at the same time, it is impossible for third parties to receive all secret messages. Chang et al. (2007 and 2013) combined EMD method with dual image based reversible data hiding technique. Their technique uses a 256 × 256 function matrix. It converts bit streams data in the 5-ary notational system data streams ranging from zero to four. Two 5-ary notational system data are embedded into one cover image pixel pair at a time [30,31]. Lee et al. (2009) developed a dual image based reversible method using a four-way cross pattern. Firstly, the two bits of the four-bit secret data are used to determine the starting position of the pattern, and the other two bits to determine the direction of movement of the pattern. Then, it applies changes to the selected pixels in the pattern to calculate stego pixels [32]. Lu et al. (2015) proposed a new dual image-based data hiding approach using the center folding strategy. Their method firstly decreased the secret data values via a folding strategy technique to obtain high image quality, and then hidden the folded secret data with an averaging method in two stego image pixels [33]. Chi et al. (2018) proposed a new dual image based reversible data hiding method involving the center folding strategy. The method uses a dynamic coding strategy, which utilizes joint neighbor coding, to develop the center folding strategy [34]. Shastri et al. (2019) developed a dual image based reversible data hiding scheme using the center folding strategy and the slidable pixel coordinate choosing technique [35]. Meikap et al. (2021) developed a center folding based data hiding scheme through the directional pixel value of orders with different block size [36]. Lu et al. (2021) proposed a reversible data hiding scheme for interpolation images featuring a multilayer center folding strategy [37].
Most dual image-based methods convert secret data from the binary system to decimal or other numeric bases to hide the secret data and add or subtract them to obtain stego pixel values. If the secret data value is too large, the difference between the values of stego image and cover image pixels is also high. Therefore, it is obtained low image quality, and it can be understood by third parties that there is secret data in the stego image. We propose a new dual image based reversible data hiding method using most significant bits and center shifting techniques to avoid this problem in this paper. The temporary values are obtained by calculating the difference between the most significant bit values of the relevant pixels and the numerical values of the secret data to reduce the numerical values of the secret data. The most significant bits are shifted by the average value of the change interval to minimize the effect of this operation on the character change interval. Thus, the mean square error values are minimized in theory. The contributions of the proposed data hiding method are listed:
  • This paper proposes a new reversible data hiding method based on dual images and center shifting technique for image steganography. In the proposed technique, data hiding and extracting processes can be performed completely lossless.
  • The proposed technique ensures a resolution for the fall of the boundary problem.
  • Even if the two stego images are obtained from third parties, the secret data cannot be obtained unless the original cover image can be created.
  • The reversible data hiding algorithm is a higher payload than the similar existing algorithms.
  • The proposed technique is resistant to the RS analysis technique according to the experimental results.
The remainder of our article is organized as follows. In Section 2, related works are presented in detail, which contains the dual image based reversible data hiding technique and center folding strategy algorithm. The proposed method, dual image and center shifting technique for image steganography, is represented in Section 3. The experimental results and comparisons to evaluate the proposed algorithm is given in Section 4. Finally, the conclusion is presented in Section 5.

2. Related Works

2.1. Location Based Dual Image Reversible Data Hiding Technique

Location based dual image reversible data hiding technique was proposed by Lee et al. [32]. In the method, the cover image pixel pairs are taken as a set of coordinates on the 𝑋 and 𝑌 axes, respectively. This pixel pair accepts the center point of the cross pattern in Figure 1 as consecutive pixels ( X i , j , X i , j + 1 ). The pixel pairs on the four sides (top, bottom, left, and right) of the center pixel pair represent different combinations of secret data of two bits each (S1 or S2).
The pattern in Figure 1 is expressed using Equation (1). Pixel value changes that will create the first stego image are realized by using Equation (1).
( X i , j , X i , j + 1 ) = { ( X i , j + 1 , X i , j + 1 )   i f   S 1 = 00 ( X i , j , X i , j + 1 1 )   i f   S 1 = 01 ( X i , j , X i , j + 1 + 1 )   i f   S 1 = 10 ( X i , j 1 , X i , j + 1 )   i f   S 1 = 11
According to the S2 secret data, the expression in Equation (1) is applied as in Equation (2) to the second stego image.
( X i , j , X i , j + 1 ) = { ( X i , j + 1 , X i , j + 1 )   i f   S 2 = 00 ( X i , j , X i , j + 1 1 )   i f   S 2 = 01 ( X i , j , X i , j + 1 + 1 )   i f   S 2 = 10 ( X i , j 1 , X i , j + 1 )   i f   S 2 = 11
In the data hiding process, for example, X 1 , 1 = 45 ,   X 1 , 2 = 46 and secret data = 0011. So, S1 = 00 and S2 = 11. Since S1 = 00 according to Equation (1), the formula ( X i , j , X i , j + 1 = X i , j + 1 , X i , j + 1 ) is applied. Accordingly, the first two pixels values of the first stego image will be X 1 , 1 = 45 + 1 = 46 , and X 1 , 2 = 46 , respectively. For S2 = 11 according to Equation (2), the formula ( X i , j , X i , j + 1 = X i , j 1 , X i , j + 1 ) is applied. Accordingly, the first two pixels values of the second stego image will be X 1 , 1 = 45 1 = 44 and X 1 , 2 = 46 , respectively.
In the data extraction process, first, the equality of the pixel groups in two stego images is examined. If the two consecutive pixel pairs are equal for two stego images ( X i , j = X i , j   a n d   X i , j + 1 = X i , j + 1 ), it means that the secret data is not embedded there. To recover secret data, the difference between the pixel pairs values of two stego images is examined. It is observed that these differences are between the values of [−2, 2]. In this way, the data extraction process is performed by applying twelve different combinations. These combination states and the secret data that can be obtained are presented in Table 1.
To recover the cover image, twelve different combinations of pixel values in the two stego images are obtained as presented in Table 2.

2.2. Dual Image Based Reversible Data Hiding Using Center Folding Strategy

Dual image based reversible data hiding using center folding strategy was proposed by Lu et al. [33]. In the method, the number of k bits is determined during data hiding process. After the secret data is parsed into k-bit d packets, it is processed for each of these packets as presented in Equation (3).
d = d 2 k 1
Figure 2 shows an example of k = 3 for this transformation process at center folding strategy.
Equation (4) is used to calculate the change in pixel values in the stego image during data hiding process. These values are used in obtaining the stego image pixel values by using the Equation (5).
d 1   =   d 2   and   d 2   =   d 2
X i , j = X i , j + d 1   and   X i , j = X i , j d 2
To avoid the fall of the boundary problem (FOBP), the data hiding process is not performed in cases where the value d is between [ 2 ( k 1 ) , 2 ( k 1 ) 1 ] . In briefly, the data hiding range in the method is [ 2 ( k 1 ) , 256 ( 2 ( k 1 ) 1 ) ] .
In the data extraction process of the method, essentially, the difference between two stego image pixel values is calculated; the formula showing this process is presented in Equation (6).
d = [ X i , j X i , j ] + 2 ( k 1 )
To recover the original cover image, the average of the two stego image pixel values must be computed and rounded up as shown in Equation (7).
X i , j = X i , j + X i , j 2
In the data hiding process, for an example, the cover image pixel values are X = { 45 ,   46 } , k = 3 , Secret data (S), S = 001111 , S1 = 001, S2 = 111 (binary system), S1 = 1, S2 = 7 (decimal system), d = {1,7}, we apply Equation (3), d = { 1 ,   7 } 4 = { 3 , 3 } , then, we use folding strategy in Equation (4), d 1 = { 2 , 1 } , and d 2 = { 1 , 2 } , finally we apply Equation (5), X i , j = X = X + d 1 = { 45 ,   46 } + { 2 , 1 } = { 43 ,   47 } , X = X d 2 = { 45 ,   46 } { 1 , + 2 } = { 46 ,   44 } .
In the data extraction process, for an example, X = { 43 , 47 }   a n d   X = { 46 , 44 } ,   X X + 2 ( k 1 ) = { 43 ,   47 } { 46 ,   44 } + 4 = { 3 , 3 } + 4 = { 1 , 7 } , S1 = 1, S2 = 7, Secret data (S) = 001111. To recover the original cover image, X = ( X + X ) / 2 = ( { 43 ,   47 } + { 46 ,   44 } ) / 2 = { 89 ,   91 } / 2 , X = ⌈{89,91}/2⌉ = {45,46}.

3. Proposed Method

In this section, a new dual image based reversible data hiding method using most significant bits and the center shifting technique is proposed. During the data hiding process, the proposed method securely hides data by generating two different stego images from a single cover image. During the data extraction process, the secret data and the original cover image are obtained from these two stego images with lossless.
The flowchart of data hiding process is presented in Figure 3. In the first step of data hiding process, the number n, which represents how many of the most significant bits of the pixel value will be used, is determined. The size of secret data or the maximum acceptable rates of distortion are decisive factors in choosing the n number. In the second step, the secret data is converted into a (n + 1) bit binary series, and each element of the series is converted to a decimal system to obtain the s series, which represents the symbols to be hidden. Briefly, (n + 1) bit hiding is performed for the selected value of n. Therefore, (n + 1)/2 bits of secret data per pixel (bpp) in the original cover image is hidden. In this way, the payload is always greater than 1 (bpp). For the determined number of n , the initial series is created by using the most significant n bits of the pixel values, and the range of this series is between [ 0 ,   2 n 1 ] . Equation (8) presents the formula used to calculate this initial series.
d = X i , j 2 8 n
The difference between the initial series values and the secret data is calculated to aim to reduce the average of the secret data to be embedded in the stego image. This operation causes the range of [ 0 , 2 n + 1 1 ] coming from secret data to expand and take values in the range of [ 2 n + 1 , 2 n + 1 1 ] . Equation (9) shows the computation of these secret data.
d = s i d i
This difference needs to be shifted in the opposite direction by half the interval of the initial series to minimize mean square error. To achieve this, Equation (10) is used, and the master record series is obtained, which will be hidden in the cover images. Subtracting the value 2 n 1 from the obtained hidden symbols series, the interval of change [ 2 n 2 ( n 1 ) + 1 ,   2 ( n + 1 ) 2 ( n 1 ) 1 ] . This range expression, when simplified, becomes [ 3 × 2 ( n 1 ) + 1 ,   3 × 2 ( n 1 ) 1 ] .
d = d 2 ( n 1 )
The change of the first and second stego images are obtained by dividing the master record series into 2 and −2, respectively. These changes are achieved using Equation (11).
d 1 = d 2 ,   d 2 = d 2
By adding these differences to the cover image as in Equation (12), two stego images are obtained and the data hiding process is completed.
X = X + d 1       a n d         X = X + d 2
During data hiding process, the change range is also divided into two, as the master record series is divided into two. Therefore, the range of change from [ 3 × 2 ( n 1 ) + 1 ,   3 × 2 ( n 1 ) 1 ] to [ 3 × 2 ( n 2 )   +   1 / 2 ,   3 × 2 ( n 2 )     1 / 2 ] . By rounding down the obtained stego pixel values, the change intervals are obtained as [ 3 × 2 ( n 2 )   ,   3 × 2 ( n 2 ) 1 ] . To avoid FOBP, the data hiding process is performed only for pixels in the range of [ 3 × 2 ( n 2 )   ,   256 3 × 2 ( n 2 ) ] . Figure 4 shows how the change difference ranges with the changes made in the secret data for n = 4.
During the data extraction process, if any of the pixel values in the same position of the two stego images are within this range and are not equal, it means that secret data is hidden there. (Due to FOBP, the secret data is not embedded for all cover image pixels.) If these two values are equal and boundary of the range [ 3 × 2 ( n 2 )   ,   256 3 × 2 ( n 2 ) ] , it means that the secret data in these pixels in the recording series is zero. If the pixel values in two stego images are outside this interval and are equal, it is understood that no secret data is hidden there. The flow chart of the data extraction process is given in Figure 5.
In the data extraction process, the initial series cannot be directly acquired as the pixel values of two stego images change. For this reason, the original cover image must first be obtained in the data extraction process. In other words, it is impossible to extract the secret data intact without the recovery of the original cover image.
X i , j = X i , j + X i , j 2
To recover the original cover image, the two stego images are averaged and rounded up, as in Equation (13). The main reason for rounding up is to neutralize the rounding down process performed during data hiding.
After the original cover image has been recovered, the initial series can be obtained using Equation (7). The extraction of the master record series is accomplished by subtracting the first stego image from the second stego image as shown in Equation (14).
d = X i , j X i , j
Finally, the initial series and shift amount are added to the master record series and the secret data symbols expressed as s are obtained using Equation (15).
s = d + d + 2 n 1
For an example, the pixel values of the cover image are X 10 = { 164 ,   63 , 120 , 135 } . When we consider the value of n = 3 , we can embed k = n + 1 = 4 for each pixel. The sum of that makes 16 bits secret data for 4 pixels. When we assume the secret data as S 10 = { 232 , 34 } and get the binary system of it, we get S 2 = { 11101000 ,   00100010 } . If this expression is converted to k = 4-bit data, S 2 = { 1110 ,   1000 ,   0010 ,   0010 } data are obtained. These data are equal to s = { 14 ,   8 ,   2 ,   2   } in decimal system. At the next step, we need to compute initial series by Equation (8). Then, we find the initial series as d = { 5 ,   1 ,   3 ,   4 } . When we add secret data to initial series by Equation (9), we get d = { 9 ,   7 , 1 , 2 } . In the next step, the shifting operation is performed in an amount of 2 n 1 by Equation (10), and d = { 5 ,   3 , 5 , 6 } series is obtained. Using Equation (11), it is calculated as d 1 = { 2 ,   1 , 3 , 3 } and d 2 = { 3 , 2 ,   2 ,   3 } . These two series are added to the cover image pixel values according to Equation (12), X = { 166 ,   64 ,   117 ,   132 } and X = { 161 ,   61 , 122 , 138 } stego images pixel values are obtained.
For extraction of secret data, we need to first calculate to original cover image pixel values by Equation (13). After computing Equation (13), we get X = { 164 ,   63 , 120 , 135 } . In the second step, we must get difference of these two stego image pixel values by Equation (14). So, we obtain d = { 5 ,   3 , 5 , 6 } . Then the initial series is computing as d = { 5 ,   1 ,   3 ,   4 } by using Equation (8), by the same method with the data hiding process. For the last step, the secret data s = { 14 ,   8 ,   2 ,   2 } are found by Equation (15). And these secret data are converted to binary series as S 2 = { 1110 ,   1000 ,   0010 ,   0010   } to obtain a binary system of secret data. Then, secret data ( S 10 = { 232 , 34 } ) are obtained by converting them from a binary to a decimal system.

4. Experimental Studies

This section presents comparisons and experimental results of our proposed method. The proposed algorithm is tested on a series of standard colored and grayscale cover images to evaluate by the data hiding measurement metrics such as embedding capacity (EC), payload (P), and peak signal-to-noise ratio (PSNR). The article also presents histogram analysis, Regular Singular (RS) analysis and pixel distributions for the security tests of the proposed method. We tested our proposed method with many images in the USC-SIPI dataset [39] that is a collection of digitized images. This dataset is utilized to support research in image processing, image analysis, and image steganography. Figure 6 presents four 512 × 512 grayscale original cover images, which are utilized to embed secret data with diverse data hiding capacity in the experimental studies. Also, the secret data, by the computer randomly generates, are embedded into these original cover images in the experiments. In addition, experimental studies have been carried out on the same color cover images of 512 × 512 sizes to demonstrate the validity of the algorithm.
The PSNR value is utilized to measure the similarity between the original cover image and the stego image. The higher this value, the better the stego image quality. Formulas showing the calculation of the mean square error (MSE), which is between the original cover image and the stego image, and PSNR values are calculated in (16) and (17), respectively. The H and W values represent the size of the cover image in (16).
MSE = 1 H   ×   W   i = 1 H j = 1 W ( C ( i , j ) S ( i , j ) ) 2
PSNR = 10 × log 10 255 2 MSE
The embedding capacity (EC) is expressed as the total secret data bits that are embedded into two stego images, while the payload (P) value in (18) represents that hidden secret data bits per pixel.
P = EC 2 ×   H   ×   W
Table 3 presents a comparison of embedding capacity and PSNR value of different stego images for n = 1. As can be seen from experimental studies, when 100% secret data is in hidden on different cover images, the PSNR values of stego image 1 and stego image 2 are around 51.15 (dB). Table 4, Table 5, Table 6 and Table 7 show the relationship between payload, embedding capacity and PSNR values for n = 1–5, respectively. When these tables are examined, in the proposed method, PSNR values are obtained above 46 (dB) to 28.5 (dB) for payload values between 1.5 (bpp) and 3 (bpp), respectively.
Figure 7 indicates average embedding capacity and PSNR values for n = 1 to 5 in all grayscale images used in experimental studies. In the proposed algorithm, it is seen from the graph that the highest PSNR values are obtained for n = 1 and the maximum payload value is acquired for n = 5.
Table 8 gives the table presenting the comparison of payload, embedding capacity and PSNR values for colored cover images. When n = 1, the PSNR value is more than 51 (dB) and up to 1,561,416 bits of secret data can be embedded. When n = 4, the PSNR value is more than 34 (dB) and up to 3,847,636 bits of secret data can be embedded, which is the most appropriate relationship between embedding capacity and PSNR in this study. When n = 5, the embedding capacity increases significantly, but it is observed that the PSNR value is lower than acceptable (30 dB).
The speed tests of the proposed method for data hiding and extraction are presented in Table 9. For n = 1 and 5, the random secret data generated by the computer were hidden and extracted into different grayscale cover images in speed test studies. When the speed tests performed are examined, it is seen that data hiding and extraction times are close to each other and are measured in milliseconds. It has been observed that with the increase in the payload, the times of data hiding and extraction increase.
Table 10 presents the comparison of dual image-based data hiding methods in the literature with the proposed reversible data hiding method. Our proposed reversible data hiding method gives similar results to the methods in the literature. Some studies provide better PSNR values than our proposed method. However, in some of these studies, it has been expressed in related studies that distortions occurred during the obtaining of the original cover image. Even at high payload values, the PSNR values of the two stego images obtained are very close to each other. Although the payload value was 2 bpp, the PSNR value was obtained over 40 (dB). In the study, it was aimed to keep the PSNR value at an acceptable level while performing high embedding capacity. When the comparison table is examined, it is seen that PSNR values are obtained with similar capacities. In the proposed study, it reached 2.5 bpp using a new method and is resistant to RS analysis attacks. In addition, with the proposed new method, secret data cannot be obtained without the original cover image.
In addition, we applied three steganalysis tests, namely histogram analysis, pixel difference histogram (PDH) and RS analysis, to prove the security of our proposed data hiding algorithm. First, the histogram analysis was performed, showing the pixel value distributions of cover, stego1 and stego2 images according to n = 1 and 3. Figure 8, Figure 9 and Figure 10 present histogram analyzes for n = 1 to 3 in a grayscale Lena image. In addition, the comb effect, which indicates that there is secret data in the stego images, was not observed.
The second method used in security tests is to obtain the distribution of pixel differences as called PDH. In the PDH diagram, the cover image is expected to be according to the zero mean normal distribution. In the stego image PDH, using some data hiding methods, it is possible that the distribution curve is zigzagging, periodically flats (e.g., PVD), multiple peaks (e.g., Histogram Shifting) or deviation from normal distribution. In addition, the similarity of the distributions of two stego images to each other can be a criterion in dual image based reversible data hiding methods. For the proposed data hiding method, PDHs are presented in Figure 11 for n = 1–4 values. It can be seen from Figure 11 that, for all n values, the PDH graphics of two stego images overlap with each other. It is also seen that cover and stego images PDH analyzes for n = 1 to 3 are close.
Finally, a statistical steganalysis method called RS analysis, which measures the ratio of Regular (R) and Singular (S) pixel groups, was used to measure the security of the algorithm. In this analysis, the ratio of regular pixel groups (Rm, R-m) to less than the ratio of the singular pixel group (Sm, S-m) indicates that there is distortion in the image, that is, secret data may be embedded. In other words, that image is normal when the expression “Sm ≈ S-m < Rm ≈ R-m” is provided. When the difference between (Rm, R-m) values and (Sm, S-m) values increase, it is understood that there is secret data in the image. Figure 12 presents RS analysis results for the proposed method. The proposed method proves to be resistant to steganalysis attacks, even when there is high capacity of secret data in the stego image, when examining Figure 12a–d.

5. Conclusions

This paper proposed a new dual image based reversible data hiding algorithm. The data hiding algorithm utilizes center shifting technique and the most significant bits to ensure high embedding capacity and security. The algorithm hides secret data lossless in the data hiding process and obtains the original cover image without distortion in the data extraction process. In addition, during the data extraction stage, the secret data cannot be extracted before the original cover image can be obtained, which provides additional security. The algorithm provides that if the payload is 2.5 bpp, the PSNR value is higher than 34 (dB). Also, experimental results show that the algorithm is resistant to RS attacks.

Author Contributions

Conceptualization, S.S.; methodology, S.S. and G.T.; software, G.T.; investigation, S.S. and G.T.; writing—original draft preparation, S.S.; writing—review and editing, S.S. and G.T.; visualization, G.T.; supervision, S.S.; project administration, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been supported by Kocaeli University Scientific Research and Development Support Program (BAP) in Turkey under project FBA-2021-2488.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Diffie, W.; Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
  2. Johnson, N.F.; Jajodia, S. Exploring steganography: Seeing the unseen. Computer 1998, 31, 26–34. [Google Scholar] [CrossRef]
  3. Solak, S.; Altınışık, U. Image steganography based on LSB substitution and encryption method: Adaptive LSB+ 3. J. Electron. Imaging 2019, 28, 043025. [Google Scholar] [CrossRef]
  4. Solak, S. High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms. IEEE Access 2020, 8, 166513–166524. [Google Scholar] [CrossRef]
  5. Solak, S.; Altınışık, U. A new approach for Steganography: Bit shifting operation of encrypted data in LSB (SED-LSB). Bilişim Teknol. Derg. 2019, 12, 75–81. [Google Scholar] [CrossRef] [Green Version]
  6. Konyar, M.Z.; Solak, S. Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher. J. Inf. Secur. Appl. 2021, 63, 103037. [Google Scholar] [CrossRef]
  7. Solak, S.; Altınışık, U. Image Steganography-Based GUI Design to Hide Agricultural Data. Gazi Univ. J. Sci. 2021, 34, 748–763. [Google Scholar] [CrossRef]
  8. Sondas, A.; Kurnaz, H. HNMH: A New Hybrid Approach Based on Near Maximum Histogram and LSB Technique for Image Steganography. Wirel. Pers. Commun. 2022, 126, 2579–2595. [Google Scholar]
  9. Lu, T.C.; Vo, T.N. Introduction of Reversible Data Hiding Schemes. In International Conference on Security with Intelligent Computing and Big-Data Services; Springer: Cham, Switzerland, 2019; pp. 170–183. [Google Scholar]
  10. Kim, P.H.; Ryu, K.W.; Jung, K.H. Reversible data hiding scheme based on pixel-value differencing in dual images. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720911006. [Google Scholar] [CrossRef]
  11. Motomura, R.; Imaizumi, S.; Kiya, H. A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images. Appl. Sci. 2022, 12, 9418. [Google Scholar] [CrossRef]
  12. Manikandan, V.M.; Murthy, K.S.R.; Siddineni, B.; Victor, N.; Maddikunta, P.K.R.; Hakak, S. A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding. Electronics 2022, 11, 3101. [Google Scholar] [CrossRef]
  13. Nguyen, T.S.; Huynh, V.T.; Vo, P.H. A Novel Reversible Data Hiding Algorithm Based on Enhanced Reduced Difference Expansion. Symmetry 2022, 14, 1726. [Google Scholar] [CrossRef]
  14. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef] [Green Version]
  15. Li, X.; Yang, B.; Zeng, T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 2011, 20, 3524–3533. [Google Scholar] [PubMed]
  16. Gui, X.; Li, X.; Yang, B. A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 2014, 98, 370–380. [Google Scholar] [CrossRef]
  17. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  18. Tsai, P.; Hu, Y.C.; Yeh, H.L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 2009, 89, 1129–1143. [Google Scholar] [CrossRef]
  19. Zhao, Z.; Luo, H.; Lu, Z.M.; Pan, J.S. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int. J. Electron. Commun. 2011, 65, 814–826. [Google Scholar] [CrossRef]
  20. Wang, S.Y.; Li, C.Y.; Kuo, W.C. Reversible data hiding based on two-dimensional prediction errors. IET Image Process. 2013, 7, 805–816. [Google Scholar] [CrossRef]
  21. Li, X.; Li, J.; Li, B.; Yang, B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
  22. Jung, K.H.; Yoo, K.Y. Data hiding method using image interpolation. Comput. Stand. Interfaces 2009, 31, 465–470. [Google Scholar] [CrossRef]
  23. Hu, J.; Li, T. Reversible steganography using extended image interpolation technique. Comput. Electr. Eng. 2015, 46, 447–455. [Google Scholar] [CrossRef]
  24. Malik, A.; Sikka, G.; Verma, H. A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range. Multimed. Tools Appl. 2020, 79, 18005–18031. [Google Scholar] [CrossRef]
  25. Hassan, F.S.; Gutub, A. Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed. Tools Appl. 2020, 79, 30087–30109. [Google Scholar] [CrossRef]
  26. Yang, C.N.; Hsu, S.C.; Kim, C. Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 2017, 50, 209–215. [Google Scholar] [CrossRef]
  27. Jung, K.H. A survey of interpolation-based reversible data hiding methods. Multimed. Tools Appl. 2018, 77, 7795–7810. [Google Scholar] [CrossRef]
  28. Wang, X.T.; Chang, C.C.; Nguyen, T.S.; Li, M.C. Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit. Signal Process. 2013, 23, 569–577. [Google Scholar] [CrossRef]
  29. Chen, Y.Q.; Sun, W.J.; Li, L.Y.; Chang, C.C.; Wang, X. An efficient general data hiding scheme based on image interpolation. J. Inf. Secur. Appl. 2020, 54, 102584. [Google Scholar] [CrossRef]
  30. Chang, C.C.; Kieu, T.D.; Chou, Y.C. Reversible data hiding scheme using two steganographic images. In Proceedings of the TENCON 2007–2007 IEEE Region 10 Conference, Taipei, Taiwan, 30 October–2 November 2007; pp. 1–4. [Google Scholar]
  31. Chang, C.C.; Lu, T.C.; Horng, G.; Huang, Y.H.; Hsu, Y.M. A high payload data embedding scheme using dual stego-images with reversibility. In Proceedings of the 2013 9th International Conference on Information, Communications & Signal Processing, Tainan, Taiwan, 2–4 December 2013; pp. 1–5. [Google Scholar]
  32. Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A reversible data hiding scheme based on dual steganographic images. In Proceedings of the 3rd international conference on ubiquitous information management and communication, Suwon, Korea, 15 February 2009; pp. 228–237. [Google Scholar]
  33. Lu, T.C.; Wu, J.H.; Huang, C.C. Dual-image-based reversible data hiding method using center folding strategy. Signal Process. 2015, 115, 195–213. [Google Scholar] [CrossRef]
  34. Chi, L.P.; Wu, C.H.; Chang, H.P. Reversible data hiding in dual stegano-image using an improved center folding strategy. Multimed. Tools Appl. 2018, 77, 8785–8803. [Google Scholar] [CrossRef]
  35. Shastri, S.; Thanikaiselvan, V. Dual image reversible data hiding using trinary assignment and centre folding strategy with low distortion. J. Vis. Commun. Image Represent. 2019, 61, 130–140. [Google Scholar] [CrossRef]
  36. Meikap, S.; Jana, B. Improved center-folding based directional pixel value ordering for reversible data hiding scheme. Multimed. Tools Appl. 2021, 80, 5617–5652. [Google Scholar] [CrossRef]
  37. Lu, T.C.; Huang, S.R.; Huang, S.W. Reversible hiding method for interpolation images featuring a multilayer center folding strategy. Soft Comput. 2021, 25, 161–180. [Google Scholar] [CrossRef]
  38. Qin, C.; Chang, C.C.; Hsu, T.J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 2015, 74, 5861–5872. [Google Scholar] [CrossRef]
  39. USC-SIPI. Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 15 October 2022).
  40. Jafar, I.F.; Darabkh, K.A.; Al-Zubi, R.T.; Saifan, R.R. An efficient reversible data hiding algorithm using two steganographic images. Signal Process. 2016, 128, 98–109. [Google Scholar] [CrossRef]
  41. Yao, H.; Qin, C.; Tang, Z.; Tian, Y. Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels’ coordinates with minimum distortion. Signal Process. 2017, 135, 26–35. [Google Scholar] [CrossRef]
  42. Lee, C.F.; Huang, Y.L. Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 2013, 52, 2237–2247. [Google Scholar] [CrossRef]
  43. Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 2015, 108, 77–89. [Google Scholar] [CrossRef]
  44. Lu, T.C.; Chang, T.C.; Shen, J.J. An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme. IEEE Access 2020, 8, 90824–90837. [Google Scholar] [CrossRef]
Figure 1. The cross pattern of indicating the pixel pair sets.
Figure 1. The cross pattern of indicating the pixel pair sets.
Applsci 12 10933 g001
Figure 2. The example of k = 3.
Figure 2. The example of k = 3.
Applsci 12 10933 g002
Figure 3. Data hiding process.
Figure 3. Data hiding process.
Applsci 12 10933 g003
Figure 4. The state of change interval for n = 4 .
Figure 4. The state of change interval for n = 4 .
Applsci 12 10933 g004
Figure 5. The flow chart of the data extraction process.
Figure 5. The flow chart of the data extraction process.
Applsci 12 10933 g005
Figure 6. The flow chart of the data extraction process. (a) Lena; (b) Airplane; (c) Peppers; (d) Baboon.
Figure 6. The flow chart of the data extraction process. (a) Lena; (b) Airplane; (c) Peppers; (d) Baboon.
Applsci 12 10933 g006
Figure 7. Comparisons of embedding capacity and PSNR values for n = 1 to 5 in grayscale images.
Figure 7. Comparisons of embedding capacity and PSNR values for n = 1 to 5 in grayscale images.
Applsci 12 10933 g007
Figure 8. Comparisons of histogram analysis for n = 1 in grayscale Lena image.
Figure 8. Comparisons of histogram analysis for n = 1 in grayscale Lena image.
Applsci 12 10933 g008
Figure 9. Comparisons of histogram analysis for n = 2 in grayscale Lena image.
Figure 9. Comparisons of histogram analysis for n = 2 in grayscale Lena image.
Applsci 12 10933 g009
Figure 10. Comparisons of histogram analysis for n = 3 in grayscale Lena image.
Figure 10. Comparisons of histogram analysis for n = 3 in grayscale Lena image.
Applsci 12 10933 g010
Figure 11. Comparisons of PDH analysis for n =1 to 4 in grayscale Lena image. (a) n = 1; (b) n = 2; (c) n = 3; (d) n = 4.
Figure 11. Comparisons of PDH analysis for n =1 to 4 in grayscale Lena image. (a) n = 1; (b) n = 2; (c) n = 3; (d) n = 4.
Applsci 12 10933 g011
Figure 12. Comparisons of RS analysis for n =1 to 4 in grayscale Lena image. (a) n = 1; (b) n = 2; (c) n = 3; (d) n = 4.
Figure 12. Comparisons of RS analysis for n =1 to 4 in grayscale Lena image. (a) n = 1; (b) n = 2; (c) n = 3; (d) n = 4.
Applsci 12 10933 g012
Table 1. Combination states and secret data values for data extraction process.
Table 1. Combination states and secret data values for data extraction process.
Combination StatesSecret Data
( X i , j , X i , j + 1 ) = ( X i , j + 2 , X i , j + 1 ) S 1 = 00   ,   S 2 = 11
( X i , j , X i , j + 1 ) = ( X i , j 2 , X i , j + 1 ) S 1 = 11   ,   S 2 = 00
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 + 2 ) S 1 = 10   ,   S 2 = 01
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 2 ) S 1 = 01   ,   S 2 = 10
( X i , j , X i , j + 1 ) = ( X i , j + 1 , X i , j + 1 + 1 ) S 1 = 00   ,   S 2 = 01
( X i , j , X i , j + 1 ) = ( X i , j + 1 , X i , j + 1 1 ) S 1 = 01   ,   S 2 = 11
( X i , j , X i , j + 1 ) = ( X i , j 1 , X i , j + 1 1 ) S 1 = 11   ,   S 2 = 01
( X i , j , X i , j + 1 ) = ( X i , j 1 , X i , j + 1 + 1 ) S 1 = 10   ,   S 2 = 00
( X i , j , X i , j + 1 ) = ( X i , j + 1 , X i , j + 1 ) S 1 = 00
( X i , j , X i , j + 1 ) = ( X i , j 1 , X i , j + 1 ) S 1 = 11
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 + 1 ) S 1 = 10
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 1 ) S 1 = 01
Table 2. Combination states and cover image pixel values for the data extraction process.
Table 2. Combination states and cover image pixel values for the data extraction process.
Combination StatesCover Image Pixel Values
( X i , j , X i , j + 1 ) = ( X i , j + 2 , X i , j + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j + X i , j 2 , X i , j + 1 + X i , j + 1 2 )
( X i , j , X i , j + 1 ) = ( X i , j 2 , X i , j + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j + X i , j 2 , X i , j + 1 + X i , j + 1 2 )
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 + 2 ) ( X i , j , X i , j + 1 ) = ( X i , j + X i , j 2 , X i , j + 1 + X i , j + 1 2 )
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 2 ) ( X i , j , X i , j + 1 ) = ( X i , j + X i , j 2 , X i , j + 1 + X i , j + 1 2 )
( X i , j , X i , j + 1 ) = ( X i , j + 1 , X i , j + 1 + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j + 1 , X i , j + 1 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j 1 , X i , j + 1 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j 1 , X i , j + 1 + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j + 1 , X i , j + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j 1 , X i , j + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 + 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 1 ) ( X i , j , X i , j + 1 ) = ( X i , j , X i , j + 1 )
Table 3. Comparison of embedding capacity and PSNR value of different stego images for n = 1.
Table 3. Comparison of embedding capacity and PSNR value of different stego images for n = 1.
EC
(Ratio)
LenaBaboonAirplanePeppers
EC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNR
Psnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2Avg
10%52,48061.1361.1761.1552,25661.1561.2061.1852,26461.2161.1961.2052,26461.1461.1361.14
20%104,91258.1158.1158.11104,68058.1658.1458.15104,70458.1258.1258.12104,69658.1358.1158.12
30%157,34456.3656.3856.37157,10456.3756.3856.38157,13656.3756.3856.38157,12056.3956.4056.40
40%209,76855.1655.0855.12209,52055.1355.1355.13209,56055.1255.1455.13209,55255.1255.1355.13
50%262,20054.1454.1754.16261,94454.1354.1454.14261,99254.1754.1654.17261,97654.1554.1654.16
60%314,63253.3853.3753.38314,36053.3853.3753.38314,41653.3553.3853.37314,40053.3653.3853.37
70%367,05652.6852.6952.6936677652.7052.7052.70366,84852.6952.7052.70366,82452.6952.6852.69
80%419,48852.1052.1252.11419,20052.1152.0952.10419,28052.1152.1152.11419,25652.1252.1252.12
90%471,91251.5851.6051.59471,61651.6051.5951.60471,70451.6051.6051.60471,68051.6151.6051.61
100%524,28851.1451.1451.14524,19051.1451.1351.14524,28851.1351.1351.13524,10451.1551.1451.15
Table 4. Comparison of embedding capacity and PSNR value of different stego images for n = 2.
Table 4. Comparison of embedding capacity and PSNR value of different stego images for n = 2.
EC
(Ratio)
LenaBaboonAirplanePeppers
EC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNR
Psnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2Avg
10%78,35456.3656.1256.2478,33056.2956.2156.2578,35454.7956.2955.5478,34556.1355.6055.87
20%157,00253.3153.0053.16156,96053.2953.0953.19157,00251.8753.2352.55156,98453.1652.5852.87
30%235,65051.5751.2051.39235,58451.5351.2851.41235,65050.0851.4750.78235,62651.3851.0551.22
40%314,28950.3149.8250.07314,20250.2550.0650.16314,28948.8450.2349.54314,25650.1249.7749.95
50%392,92849.3548.9049.13392,82649.2749.0949.18392,92847.9249.2848.60392,88949.1948.8849.04
60%471,57648.4948.1648.33471,45048.4648.3348.40471,57647.1648.5247.84471,52848.3948.1548.27
70%550,21847.7247.5047.61550,07447.7747.6647.72550,21846.4747.8347.15550,16147.7147.4947.60
80%628,86647.1246.9047.01628,69847.2047.0847.14628,86645.9047.2546.58628,79447.1546.9247.04
90%707,50546.6146.3946.50707,31346.6846.5846.63707,50545.3446.7646.05707,79446.6346.3746.50
100%786,43246.1245.9246.02786,22246.2346.1446.19786,43244.8446.3145.58786,35146.1645.9446.05
Table 5. Comparison of embedding capacity and PSNR value of different stego images for n = 3.
Table 5. Comparison of embedding capacity and PSNR value of different stego images for n = 3.
EC
(Ratio)
LenaBaboonAirplanePeppers
EC (bits)PSNREC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNR
Psnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2Avg
10%104,44050.3750.4450.41104,36850.4450.5750.51104,44049.6750.0749.87104,37650.2050.0250.11
20%209,29647.4347.3647.40209,15247.4647.4747.47209,29646.7347.0746.90209,16047.2047.0547.13
30%314,16045.7045.5845.64313,93645.6245.6245.62314,16044.9745.3545.16313,95245.4345.4145.42
40%419,01644.4444.3044.37418,72044.3144.3644.34419,01643.7144.1243.92418,74444.1544.1044.13
50%523,87243.4643.3143.39523,50443.3743.4243.40523,87242.7543.1642.96523,53643.2443.1443.19
60%628,72842.6642.5942.63628,28042.6242.6742.65628,72841.9742.3842.18628,32042.4942.4042.45
70%733,58441.9441.9141.93733,06441.9041.9841.94733,58441.3141.7241.52733,11241.8641.7641.81
80%838,45641.3441.2941.32837,85641.3641.4141.39838,45640.7341.1640.95837,91241.2541.1741.21
90%943,31240.8240.7840.80942,64040.8740.9240.90943,31240.2240.6440.43942,69640.7340.6340.68
100%1,048,57640.3740.3340.351,047,83240.4040.4440.421,048,57639.7340.1839.961,047,89640.3040.2140.26
Table 6. Comparison of embedding capacity and PSNR value of different stego images for n = 4.
Table 6. Comparison of embedding capacity and PSNR value of different stego images for n = 4.
EC
(Ratio)
LenaBaboonAirplanePeppers
EC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNR
Psnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2Avg
10%131,05044.4744.4644.47130,91544.4744.5344.50131,05043.7143.9943.85129,73044.2244.1344.18
20%262,12041.4841.4041.44261,84041.4641.4741.47262,12040.8141.0540.93259,48041.2441.1741.21
30%393,19539.7539.6539.70392,77039.7039.6839.69393,19539.0439.2839.16389,23539.5339.5239.53
40%524,26538.4938.3738.43523,70538.3838.4038.39524,26537.8138.0537.93518,98538.2338.2138.22
50%655,33037.4837.3837.43654,63537.4437.4537.45655,34036.8537.1136.98648,74037.3237.2937.31
60%786,40036.6836.6236.65785,57036.6536.6836.67786,41036.0836.3336.21778,49036.5936.5536.57
70%917,48036.0035.9635.98916,50535.9936.0236.01917,49035.4235.6735.55908,25035.9135.8735.89
80%1,048,55535.3935.3535.371,047,44035.4235.4435.431,048,56034.8435.0934.971,038,00035.3635.3335.35
90%1,179,62534.8734.8434.861,178,37034.9034.9134.911,179,63534.3234.5734.451,167,75534.8034.7834.79
100%1,310,71034.4034.3834.391,309,31534.4834.5034.491,310,72033.8134.0933.951,297,51534.3234.3534.34
Table 7. Comparison of embedding capacity and PSNR value of different stego images for n = 5.
Table 7. Comparison of embedding capacity and PSNR value of different stego images for n = 5.
EC
(Ratio)
LenaBaboonAirplanePeppers
EC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNREC
(bits)
PSNR
Psnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2AvgPsnr1Psnr2Avg
10%157,21838.4638.4638.46156,57038.4938.5238.51157,09837.8637.9937.93149,05238.4938.4538.47
20%314,48435.4535.4135.43313,19435.5035.5035.50314,24434.8234.9434.88298,14035.4835.4535.47
30%471,74433.7033.6533.68469,81233.7033.6933.70471,38433.1033.2233.16447,22833.7633.7633.76
40%629,01032.4232.3732.40626,43632.4332.4432.44628,53631.8932.0131.95596,31632.4832.4932.49
50%786,27631.4631.4131.44783,04831.5031.5131.51785,68230.9431.0731.01745,40431.5831.5831.58
60%943,54830.6630.6430.65939,67230.7030.7130.71942,83430.1730.2930.23894,49830.8330.8330.83
70%1,100,82029.9729.9529.961,096,29630.0130.0230.021,099,98029.5129.6329.571,043,58630.1630.1530.16
80%1,258,08029.3729.3629.371,252,91429.4529.4629.461,257,12028.9229.0428.981,192,67429.5829.5729.58
90%1,415,34628.8528.8428.851,409,53828.9428.9428.941,414,26628.3728.5028.441,341,76229.0829.0829.08
100%1,572,64828.3928.3828.391,566,19228.4828.4928.491,571,45427.8928.0227.961,490,85028.5928.5928.59
Table 8. Comparison of average P, EC and PSNR values for n = 1 to 5 in all colored images used in experimental studies.
Table 8. Comparison of average P, EC and PSNR values for n = 1 to 5 in all colored images used in experimental studies.
Embedding Capacity (EC) Ratio
10%20%30%40%50%60%70%80%90%100%
n = 1EC (bits)156,148312,306468,466624624780,780936,9501,093,1061,249,2621,405,4241,561,416.5
PSNR61.1758.1756.4055.1654.1853.3952.7252.1551.6351.18
n = 2EC (bits)233,880467,809.5701,7419356781,169,6051,403,5351,637,4651,871,3932,105,3212,339,292
PSNR55.9352.8451.0949.8348.8548.0647.3946.8146.3045.84
n = 3EC (bits)310,680621,446932,21812429861,553,7521,864,5182,175,2862,486,0502,796,8183,107,663
PSNR50.2147.1145.3744.1043.1442.3441.6741.0940.5840.13
n = 4EC (bits)384,641769,4021,154,17515389361,923,7022,308,4652,693,2273,077,9913,462,7533,847,631
PSNR44.2941.2239.4738.2137.2336.4535.7735.1934.6834.23
n = 5EC (bits)446,355892,873.51,339,3861,785,8952,232,4032,678,9143,125,4223,571,9334,018,4444,465,063
PSNR38.4935.4233.6732.4131.4430.6529.9729.3928.8728.42
Table 9. Comparison of data hiding and extraction process speed tests of the proposed algorithm.
Table 9. Comparison of data hiding and extraction process speed tests of the proposed algorithm.
Test 1 (sec)Test 2 (sec)Test 3 (sec)Test 4 (sec)Test 5 (sec)Average (sec)
n = 1Data Embedding0.02490.02630.02630.02710.02520.0259
Data Extraction0.03070.02980.02970.02980.02980.0299
n = 2Data Embedding0.03190.03040.02970.03440.03040.0313
Data Extraction0.04550.03930.03700.03810.03810.0395
n = 3Data Embedding0.04160.03640.04060.03750.03790.0388
Data Extraction0.05540.05310.05410.05580.05300.0543
n = 4Data Embedding0.04290.04250.04550.04290.04410.0435
Data Extraction0.07020.06770.06160.07070.07060.0681
n = 5Data Embedding0.05510.04370.05950.04890.05040.0515
Data Extraction0.07290.06970.07750.07990.07850.0757
Table 10. Comparison of previous data hiding algorithm and the proposed algorithm.
Table 10. Comparison of previous data hiding algorithm and the proposed algorithm.
ReferencesMeasurement MetricsLenaBaboonPeppersBarbaraGoldhillAverage
[33]PSNR (dB) (Stego-1) 46.3747.3446.7246.1546.1646.66
PSNR (dB) (Stego-2)46.3646.5646.1246.7146.6446.55
PSNR(Average)46.3746.9546.4246.4346.4046.61
EC (bits)786,432786,258786,670786,432786,432786,442
P (bpp)1.501.501.501.501.501.50
[35]
(with distortion)
PSNR (dB) (Stego-1) 51.1551.1651.1651.1450.1351.15
PSNR (dB) (Stego-2)50.1850.1750.1850.1650.1850.17
PSNR(Average)50.6650.6650.6650.6550.6550.66
EC (bits)818,914818,814818,948819,315819,386819,085
P (bpp)1.561.561.561.561.561.56
[40]PSNR (dB) (Stego-1) 48.7048.7148.7148.7048.7248.71
PSNR (dB) (Stego-2)48.7148.7148.7148.7148.7148.71
PSNR(Average)48.7148.7148.7148.7148.7248.71
EC (bits)650,369650,799650,637650,781650,726650,568
P (bpp)1.241.241.241.241.241.24
[41]
(with distortion)
PSNR (dB) (Stego-1) 45.9346.3847.2046.3846.8346.65
PSNR (dB) (Stego-2)45.3547.4346.7946.5746.6246.66
PSNR(Average)45.6446.9147.0046.4846.7346.66
EC (bits)819,356819,080818,342819,156819,269819,034
P (bpp)1.561.561.561.561.561.56
[42]PSNR (dB) (Stego-1) 49.6349.6349.6449.6249.6349.63
PSNR (dB) (Stego-2)49.6349.6149.6349.6349.6249.63
PSNR(Average)49.6349.6249.6449.6349.6349.63
EC (bits)560,801560,686560,572561,223560,740560,880
P (bpp)1.071.071.071.071.071.07
[43]PSNR (dB) (Stego-1) 49.2049.2149.1949.2249.2349.21
PSNR (dB) (Stego-2)49.2149.2049.2149.2049.1849.20
PSNR(Average)49.2149.2149.2049.2149.2149.21
EC (bits)524,288524,204524,192524,288524,288524,257
P (bpp)1.001.001.001.001.001.00
[44]PSNR (dB) (Stego-1) 47.3447.3447.3447.3447.3447.34
PSNR (dB) (Stego-2)47.4147.4147.4147.4147.4147.41
PSNR(Average)47.3747.3847.3747.3747.3747.37
EC (bits)917,504917,504917,504917,504917,504917,504
P (bpp)1.751.751.751.751.751.75
Proposed (n = 1)PSNR (dB) (Stego-1) 51.1451.1451.1551.1551.1551.15
PSNR (dB) (Stego-2)51.1451.1351.1451.1551.1451.14
PSNR(Average)51.1451.1451.1551.1551.1551.14
EC (bits)524,288524,190524,104524,136524,136524,171
P (bpp)1.001.001.001.001.001.00
Proposed (n = 2)PSNR (dB) (Stego-1) 46.1246.2346.1646.0746.1146.14
PSNR (dB) (Stego-2)45.9246.1445.9445.7745.9345.94
PSNR(Average)46.0246.1946.0545.9246.0246.04
EC (bits)786,432786,222786,351786,144786,144786,259
P (bpp)1.501.501.501.501.501.50
Proposed (n = 3)PSNR (dB) (Stego-1) 40.3740.4040.3040.2340.3340.33
PSNR (dB) (Stego-2)40.3340.4440.2140.1440.1840.26
PSNR(Average)40.3540.4240.2640.1940.2640.29
EC (bits)1048,5761047,8321047,8961048,1681,048,1681,048,128
P (bpp)2.002.002.002.002.002.00
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Solak, S.; Tezcan, G. A New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique. Appl. Sci. 2022, 12, 10933. https://doi.org/10.3390/app122110933

AMA Style

Solak S, Tezcan G. A New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique. Applied Sciences. 2022; 12(21):10933. https://doi.org/10.3390/app122110933

Chicago/Turabian Style

Solak, Serdar, and Gökhan Tezcan. 2022. "A New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique" Applied Sciences 12, no. 21: 10933. https://doi.org/10.3390/app122110933

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop