Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology
Abstract
:1. Introduction
2. Related Work
2.1. Pixel Value Differencing
2.2. Wu et al.’s Technique
2.3. Liu et al.’s Technique
3. Proposed Method
3.1. Embedding Process
- Step 1:
- Divide C into several n nonoverlapping nine consecutive adjacent pixels (Pi,1~Pi,9) into a set of 3 × 3 size sub-image blocks and scan the cover image in a Z-font (shown in Figure 1), where i = 1~n;
- Step 2:
- Set Pi,5 as the reference pixel, then calculate the pixel difference value dj = Pi,5–Pi, j, where j = 1, 2, 3, 4, 6, 7, 8, 9;
- Step 3:
- Determine the interval range of |dj| according to Table 1. If |dj| belongs in the range (0, 7), the capacity k is 3, upper limit u is 7, and lower limit l is 0. The way to calculate k is using Equation (1):
- Step 4:
- Take k bits from m and convert it to a decimal value b;
- Step 5:
- Calculate d′j using Equation (2):
- Step 6:
- According to whether dj is greater than zero, it is determined whether Pi,5 should be added or subtracted with d′j, which becomes the stego pixel P′i, j, as shown in Equation (3):
- Step 7:
- Repeat the above steps until each pixel is embedded. The stego block in Figure 6 a is obtained. Then, apply the pixel shifting process (shown in Section 3.3) to obtain the final stego block. Figure 6a represents the stego pixel block before the shifting process while Figure 6b shows the stego pixel block after the shifting process has been completed.
3.2. Extracting Process
- Step 1:
- Divide S into several n nonoverlapping nine consecutive adjacent pixels (P′i, 1~P′i, 9) into a set of 3 × 3 size sub-image blocks and scan the cover image in a Z-font (shown in Figure 1), where i = 1~n;
- Step 2:
- Set P′i, 5 as the reference pixel, and calculate the pixel difference value d′j = |P′i, 5–P′i, j|. Then, determine the interval range according to Table 1, where j = 1, 2, 3, 4, 6, 7, 8, 9;
- Step 3:
- Calculate the capacity b = d′j − l, then convert it to a binary value and add it to m to complete the extraction;
- Step 4:
- Repeat the above steps until each pixel is extracted, and then extraction of the secret message is completed.
3.3. Pixel Shifting
3.4. Example of the Proposed Embedding Process Method
- Step 1:
- Suppose Pi,1~Pi,9 = 131, 140, 128, 127, 133, 139, 130, 137, and 129; m = 1010100110111001011000102;
- Step 2:
- Set Pi,5 = 133 as the reference pixel, then calculate the pixel difference value |d1| = 2, |d2| = 7, |d3| = 5, |d4| = 6, |d6| = 6, |d7| = 3, |d8| = 4, and |d9| = 4;
- Step 3:
- Determine the interval range according to Table 1. Using Equation (1) to obtain k, set 3 bits in this example;
- Step 4:
- Take k bits from m, and convert it to decimal value b. Therefore, k1 = 1012, k2 = 0102, k3 = 0112, k4 = 0112, k6 = 1002, k7 = 1012, k8 = 1002, and k9 = 0102. b1 = 5, b2 = 2, b3 = 3, b4 = 3, b6 = 4, b7 = 5, b8 = 4, and b9 = 2;
- Step 5:
- Apply Equation (2) to calculate d′j. Thus, d′1 = 5, d′2 = 2, d′3 = 3, d′4 = 3, d′6 = 4, d′7 = 5, d′8 = 4, and d′9 = 2;
- Step 6:
- Calculate stego pixel P′i, j using Equation (3). The stego pixel P′i,1 = 133 + 5 = 138, P′i,2 = 133 − 2 = 131, P′i,3 = 133 + 3 = 136, P′i,4 = 133 + 3 = 136, P′i,6 = 133 − 4 = 129, P′i,7 = 133 + 5 = 138, P′i,8 = 133 − 4 = 129, and P′i,9 = 133 + 2 = 135.
3.5. Example of the Proposed Extracting Process Method
- Step 1:
- Suppose P″i,1~P″i,9 = 134, 127, 132, 132, 129, 125, 134, 125, and 131;
- Step 2:
- Set P″i,5 = 129 as the reference pixel, and calculate the pixel difference value |d′j|, |d′1| = 5, |d′2| = 2, |d′3| = 3, |d′4| = 3, |d′6| = 4, |d′7| = 5, |d′8| = 4, and |d′9| = 2. Then, determine the interval range according to Table 1;
- Step 3:
- Calculate b and convert it to a binary value as a secret message. Therefore, b1 = 5 − 0 = 5, b2 = 2 − 0 = 2, b3 = 3 − 0 = 3, b4 = 3 − 0 = 3, b6 = 4 − 0 = 4, b7 = 5 − 0 = 5, b8 = 4 − 0 = 4, and b9 = 2 − 0 = 2. The secret message is extracted as m = 1010100110111001011000102.
4. Experimental Results
4.1. Comparison
4.2. Security Analysis
- (1)
- Regular groups with R−M and RM;
- (2)
- Singular groups with SM and S−M;
- (3)
- Unusable groups.
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Subhedar, M.S.; Mankar, V.H. Current status and key issues in image steganography: A survey. Comput. Sci. Rev. 2002, 13–14, 95–113. [Google Scholar] [CrossRef]
- Cheddad, A.; Condell, J.; Curran, K.; Kevitt, P.M. Digital image steganography: Survey and analysis of current methods. Signal Process. 2010, 90, 727–752. [Google Scholar] [CrossRef] [Green Version]
- Shiu, C.W.; Chen, Y.C.; Hong, W. Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process. Image Commun. 2015, 39, 226–233. [Google Scholar] [CrossRef]
- Tai, W.L.; Yeh, C.M.; Chang, C.C. Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol. 2009, 19, 906–910. [Google Scholar]
- Jung, K.H. A Survey of Reversible Data Hiding Methods in Dual Images. IETE Tech. Rev. 2016, 33, 441–452. [Google Scholar] [CrossRef]
- Ren, H.; Lu, W.; Chen, B. Reversible data hiding in encrypted binary images by pixel prediction. Signal Process. 2019, 165, 268–277. [Google Scholar] [CrossRef]
- Wu, N.I.; Hwang, M.S. Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images. Displays 2017, 49, 116–123. [Google Scholar] [CrossRef]
- Khan, A.; Siddiqa, A.; Munib, S.; Malik, S.A. A recent survey of reversible watermarking techniques. Inf. Sci. 2014, 279, 251–272. [Google Scholar] [CrossRef]
- Wang, S.H.; Lin, Y.P. Wavelet Tree Quantization for Copyright Protection Watermarking. IEEE Trans. Image Process. 2004, 13, 154–165. [Google Scholar] [CrossRef]
- Wong, P.W.; Memon, N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 2001, 10, 1593–1601. [Google Scholar] [CrossRef]
- Wu, C.C.; Kao, S.J.; Hwang, M.S. A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 2011, 84, 2196–2207. [Google Scholar] [CrossRef]
- Chan, C.K.; Cheng, L.M. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
- Wu, D.C.; Tsai, W.H. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 2003, 24, 1613–1626. [Google Scholar] [CrossRef]
- Swain, G. A Steganographic Method Combining LSB Substitution and PVD in a Block. Procedia Comput. Sci. 2016, 85, 39–44. [Google Scholar] [CrossRef] [Green Version]
- Lu, Z.M.; Guo, S.Z. Lossless Information Hiding in Images on Transform Domains. Lossless Inf. Hiding Images 2017, 1, 143–204. [Google Scholar]
- Hirasawa, R.; Imaizumi, S.; Kiya, H. An MSB Prediction-Based Method with Marker Bits for Reversible Data Hiding in Encrypted Images. In Proceedings of the IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech), Nara, Japan, 9–11 March 2021; pp. 48–50. [Google Scholar] [CrossRef]
- Zhang, F.; Lu, W.; Liu, H.; Yeung, Y.; Xue, Y. Reversible data hiding in binary images based on image magnification. Multimed. Tools Appl. 2019, 78, 21891–21915. [Google Scholar] [CrossRef]
- Yang, B.; Schmucker, M.; Funk, W.; Busch, C.; Sun, S. Integer DCT-based reversible watermarking for images using companding technique. In Security, Steganography, and Watermarking of Multimedia Contents VI; SPIE: Bellingham, WA, USA, 2004; Volume 5306, pp. 405–415. [Google Scholar]
- He, W.; Cai, Z. Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion. IEEE Trans. Image Process. 2021, 30, 5045–5055. [Google Scholar] [CrossRef] [PubMed]
- Leng, L.; Li, M.; Kim, C.; Bi, X. Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed. Tools Appl. 2017, 76, 333–354. [Google Scholar] [CrossRef]
- Deeba, F.; Kun, S.; Dharejo, F.A.; Zhou, Y. Wavelet-Based Enhanced Medical Image Super Resolution. IEEE Access 2020, 8, 37035–37044. [Google Scholar] [CrossRef]
- Leng, L.; Zhang, J.S.; Khan, M.K.; Chen, X.; Alghathbar, K. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int. J. Phys. Sci. 2010, 5, 2543–2554. [Google Scholar]
- Puteaux, P.; Puech, W. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1670–1681. [Google Scholar] [CrossRef] [Green Version]
- Wen, H.; Ma, L.; Liu, L.; Huang, Y.; Chen, Z.; Li, R.; Liu, Z.; Lin, W.; Wu, J.; Li, Y.; et al. High-quality restoration image encryption using DCT frequency-domain compression coding and chaos. Sci. Rep. 2022, 12, 16523. [Google Scholar] [CrossRef] [PubMed]
- Wu, H.C.; Wu, N.I.; Tsai, C.S.; Hwang, M.S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc.—Vis. Image Signal Process. 2005, 152, 611–615. [Google Scholar] [CrossRef] [Green Version]
- Liu, H.H.; Lin, Y.C.; Lee, C.M. A digital data hiding scheme based on pixel-value differencing and side match method. Multimed. Tools Appl. 2018, 78, 12157–12181. [Google Scholar] [CrossRef]
- Li, Z.; He, Y. Steganography with pixel-value differencing and modulus function based on PSO. J. Inf. Secur. Appl. 2018, 43, 47–52. [Google Scholar] [CrossRef]
- Hameed, M.A.; Hassaballah, M.; Aly, S.; Awad, A.I. An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. IEEE Access 2019, 7, 185189–185204. [Google Scholar] [CrossRef]
Range (l, u) | (0, 7) | (8, 15) | (16, 31) | (32, 63) | (64, 127) | (128, 255) |
---|---|---|---|---|---|---|
Capacity k | 3 | 3 | 4 | 5 | 6 | 7 |
R (l, u) | R1 ∈ [0, 7] | R1 ∈ [8, 15] | R2 ∈ [16, 31] | R3 ∈ [32, 63] | R4 ∈ [64, 95] | R5 ∈ [96, 127] | R6 ∈ [128, 191] | R7 ∈ [192, 255] |
---|---|---|---|---|---|---|---|---|
Capacity e | 3 | 3 | 4 | 5 | 5 | 5 | 5 | 5 |
Images 512 × 512 | Capacity | PSNR without Shifting | PSNR with Shifting |
---|---|---|---|
Lena | 723,266 | 36.21 | 36.54 |
Peppers | 719,653 | 36.27 | 36.56 |
Baboon | 828,119 | 30.52 | 30.80 |
Airplane | 731,023 | 34.99 | 35.37 |
Tiffany | 717,626 | 36.24 | 36.60 |
Boat | 745,232 | 34.37 | 34.67 |
Truck | 729,695 | 36.23 | 36.57 |
Tank | 727,378 | 36.36 | 36.69 |
Goldhill | 731,881 | 35.94 | 36.27 |
Barbara | 792,574 | 31.40 | 31.68 |
Average | 744,645 | 34.85 | 35.18 |
Images 512 × 512 | Wu and Tsai [13] | Li and He [27] | Hameed et al. [28] | Proposed Method | ||||
---|---|---|---|---|---|---|---|---|
Capacity | PSNR | Capacity | PSNR | Capacity | PSNR | Capacity | PSNR | |
Lena | 51,219 | 38.94 | 70,217 | 42.74 | 104,055 | 36.32 | 723,266 | 36.54 |
Peppers | 50,907 | 37.34 | 70,281 | 42.45 | 105,505 | 35.91 | 719,653 | 36.56 |
Baboon | 57,146 | 33.34 | 86,466 | 36.63 | 105,880 | 35.40 | 828,119 | 30.80 |
Airplane | N/A | N/A | N/A | N/A | N/A | N/A | 731,023 | 35.37 |
Tiffany | N/A | N/A | N/A | N/A | N/A | N/A | 717,626 | 36.60 |
Boat | 52,635 | 34.89 | 74,623 | 39.41 | 105,507 | 35.72 | 745,232 | 34.67 |
Truck | N/A | N/A | N/A | N/A | N/A | N/A | 729,695 | 36.57 |
Tank | N/A | N/A | N/A | N/A | N/A | N/A | 727,378 | 36.69 |
Average | 52,976 | 36.13 | 75,397 | 40.31 | 105,237 | 35.83 | 740,249 | 35.48 |
Images 512 × 512. | Liu et al. [26] | Proposed Method | ||
---|---|---|---|---|
Capacity | PSNR | Capacity | PSNR | |
Lena | 712,168 | 36.70 | 723,266 | 36.54 |
Peppers | 713,062 | 34.83 | 719,653 | 36.56 |
Baboon | 808,760 | 32.04 | 828,119 | 30.80 |
Airplane | 717,511 | 36.19 | 731,023 | 35.37 |
Tiffany | 709,758 | 35.91 | 717,626 | 36.60 |
Boat | 724,317 | 35.87 | 745,232 | 34.67 |
Goldhill | 720,274 | 36.23 | 731,881 | 36.27 |
Barbara | 764,388 | 33.56 | 792,574 | 31.68 |
Average | 733,780 | 35.16 | 748,672 | 34.81 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, C.-T.; Shongwe, N.S.; Weng, C.-Y. Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology. Electronics 2023, 12, 1200. https://doi.org/10.3390/electronics12051200
Huang C-T, Shongwe NS, Weng C-Y. Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology. Electronics. 2023; 12(5):1200. https://doi.org/10.3390/electronics12051200
Chicago/Turabian StyleHuang, Cheng-Ta, Njabulo Sinethemba Shongwe, and Chi-Yao Weng. 2023. "Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology" Electronics 12, no. 5: 1200. https://doi.org/10.3390/electronics12051200
APA StyleHuang, C. -T., Shongwe, N. S., & Weng, C. -Y. (2023). Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology. Electronics, 12(5), 1200. https://doi.org/10.3390/electronics12051200