Next Article in Journal
Two-Dimensional Turbulent Thermal Free Jet: Conservation Laws, Associated Lie Symmetry and Invariant Solutions
Next Article in Special Issue
High Performance Parallel Pseudorandom Number Generator on Cellular Automata
Previous Article in Journal
Invariants of Bonded Knotoids and Applications to Protein Folding
Previous Article in Special Issue
A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Reversible Data Hiding Algorithm Based on Enhanced Reduced Difference Expansion

School of Engineering and Technology, Tra Vinh University, Tra Vinh 87110, Vietnam
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(8), 1726; https://doi.org/10.3390/sym14081726
Submission received: 11 July 2022 / Revised: 9 August 2022 / Accepted: 11 August 2022 / Published: 18 August 2022

Abstract

:
Reversible data hiding is a data-hiding technique which has the ability to recover the original version from stego-images after the secret information is extracted. In this paper, we propose a novel reversible data-hiding scheme based on an enhanced reduced difference-expansion technique. In the proposed scheme, the original image is divided into non-overlapping quad-blocks for embedding data. Then, to enhance the security, the secret bits are encrypted based on the encryption key and a symmetry-based strategy. To improve embedding capacity further, two adjacent encrypted bits are converted into a corresponding decimal digit. Difference expansion (DE) technique is applied to embed a decimal form instead of a binary version. Moreover, to maintain the good image quality, the enhanced reduced difference-expansion technique is used to reduce the original difference values so that it is suitable for decimal embedding. The experimental results demonstrated that the proposed scheme has achieved better performance in comparison with previous solutions.

1. Introduction

With the rapid development of computer networks and multimedia technology, digital information is transmitted on the network environment more conveniently. However, such digital information faces many risks related to security issues. To solve these issues, many cryptography techniques i.e., DES, AES and RSA [1], have been proposed. Cryptography techniques encrypt the digital information from plaintext to cipher text, leading to an increase in attention from attackers. Another promising solution is data-hiding techniques that conceal the confidential data into cover data, i.e., text, images, audio.... In the data-hiding schemes, imperceptibility must be considered. This means that the attacker cannot detect the secret information in the marked data. The data-hiding schemes can be classified into two different categories, i.e., irreversible and reversible data-hiding schemes. For an irreversible data-hiding scheme, only secret data can be extracted, while the restoration of the cover data is unavailable. In contrast, a reversible data-hiding (RDH) scheme can extract the secret data and recover the original cover images in the extracting process. In recent years, RDH schemes have received much attention from the research community [2,3,4,5]. RDH schemes are suitable in some sensitive scenarios, such as military, medical and forensic fields, where any permanent distortion is unacceptable, and the exact recovery of the original cover data is required. RDH schemes for digital images can be classified into three different domains, including: frequency, compression, and spatial domains [6,7,8,9,10,11,12,13,14,15,16,17,18].
In the frequency domain [6,7,8,9], the cover image is first transformed into frequency coefficients via various transform functions, i.e., discrete Fourier transform (DFT), discrete cosine transform (DCT), and discrete wavelet transform (DWT). In 2018, Vo et al. [6] proposed a 2D HS-based RDH scheme. In their scheme, the suitable quantized DCT (QDCT) coefficients are determined for embedding the secret data. As a result, their embedding capacity and image quality are improved further. Later on, Vo et al. proposed another algorithm [7] in the frequency domain. In [7], they applied both DCT and singular-value decomposition (SVD) mechanisms to embed watermarks for digital image copyright. Compared with RDH schemes in the spatial domain, RDH schemes in the frequency domain are more complex in terms of the execution. However, the RDH schemes in the frequency domain maintain greater robustness against various malicious attacks. In the compression domain, the cover images are compressed to preserve the room for containing the secret data. Many RDH solutions for compressed images have been proposed in [10,11,12,13]. These schemes obtained a high embedding capacity. However, they offered an increase in file size when containing the secret data.
In the spatial domain, the RDH schemes can be divided into two categories: histogram-shifting (HS) based and difference-expansion (DE) based. In the HS-based category, in 2006, Ni et al. proposed a HS-based RDH scheme [15]. Ni et al.’s scheme embedded the secret bits by modifying the pairs of peak point and zero point. In the HS-based RDH technique, the embedding capacity depends on the height of the peak point bin of the histogram. Therefore, in order to increase the embedding capacity, many algorithms [16,17,18] have tried to generate a sharper histogram. The HS-based RDH techniques obtained a high embedding capacity for smooth images. However, they suffered a low embedding capacity for texture images. In the DE-based category, the attention of several researchers was attracted [14,19,20,21,22,23,24,25,26,27,28]. In 2003, Tian [14] proposed the first DE-based scheme. In [14], two adjacent pixels in the cover image are grouped into a pair. Then, the difference in pixels in the pair is computed and expanded to carry one secret bit. Therefore, the maximum embedding capacity in [14] can be obtained up to 0.5 bpp. To increase the embedding capacity, Alattar [19] proposed a new DE-based RDH scheme. Instead of using two adjacent pixels as was done in [14], in Alattar’s scheme the cover image is divided into non-overlapping blocks with a size of 2 × 2 pixels. With four pixels in each block, up to three difference values are determined and expanded for embedding three secret bits. As a result, the higher embedding capacity is obtained in Alattar’s scheme, up to 0.75 bpp. However, by doing so, the original pixels will be twice changed for containing the secret data, causing much distortion in the stego-images. To overcome this shortcoming, several improved solutions were proposed in [20,21,22,23,24,25]. To further improve the performance of Alattar’s scheme, Liu et al. [20] proposed a novel DE-based RDH scheme by using a reduced difference expansion (RDE) algorithm. In their scheme, to minimum the modification, the difference value between pixels of the pair is reduced before embedding the secret bits. Liu et al.’s scheme obtained the better quality of stego-images. Later on, to improve embedding capacity further, a hybrid RDH scheme based on DE and HS techniques was proposed by Kukreja et al. [25]. In Kukreja et al.’s scheme, the cover image is divided into non-overlapping blocks with the size of a × b pixels. In each block, a × (b−1) difference values are calculated from a × b pixels of the block. Then, the histogram of these difference values is constructed for embedding the secret data by HS technique. According to the properties of 2 × 2 blocks, several RDE-based RDH schemes are proposed in [21,22,23,24]. In such schemes, different techniques are used to determine the suitable difference values for embedding data. The image blocks are divided into three different groups, i.e., (1) expandable, (2) changeable, and (3) unchangeable groups. To avoid overflow/underflow problems, only expandable and changeable groups are modified to carry secret bits. For the blocks belonging to the expandable group, the difference values, larger than one, are reduced to embed the secret data by using the RDE technique. For the blocks belonging to the changeable group, the original difference values are directly modified to embed secret data by the DE algorithm. By applying the RDE technique, these RDE-based RDH schemes [20,21,22,23,24,25,26,27,28] achieved the better image quality of stego-images. However, they offered a low embedding capacity, because each pair of pixels is used to carry only one secret bit.
In the DE-based and RDE-based RDH schemes, only one secret bit is embedded into the difference of the pixel pair. In this paper, to improve the embedding capacity while maintaining the good image quality, a novel RDH scheme is proposed by using the ERDE technique. In the proposed scheme, two determined thresholds are used to classify difference values and to determine how these difference values are to be processed to maintain the image quality. Then, more secret bits are embedded into small difference values. For other difference values, they are reduced. Further, to increase the embedding capacity, small, reduced difference values are used to conceal the secret bits while the others are kept unchanged to guarantee the good image quality of the stego-images.
The rest of the paper is organized as follows; we briefly introduce previous related works in Section 2. Then, Section 3 elaborates the proposed scheme. To evaluate the performance of the proposed scheme, experimental results are given in Section 4. Our conclusions are drawn in Section 5.

2. Related Works

2.1. Difference Expansion Scheme

In 2003, a DE-based RDH scheme was first proposed by Tian [14]. In Tian’s scheme, the cover image is grouped into pair of pixels ( p 1 , p 2 ). Then, the difference value d and the average value m of a pair of pixels are computed using Equation (1).
d = p 1 p 2                                                                           m = p 1 + p 2 2
where . is the floor function to round a number down to the nearest integer.
Then, the secret data s is embedded by applying the expansion technique in Equation (2).
d ¯ = 2 × d + s  
where d ¯ is the result of embedding process, and s is the embedded secret bit.
Finally, the new stego-pixel pair is updated according to Equation (3).
p ¯ 1 = m + d ¯ + 1 2                                                                               p ¯ 2 = m d ¯ 2
where p ¯ 1 and p ¯ 2 are two stego pixels after the embedding process.
In Tian’s scheme, two cover pixels are used to carry only one secret bit; therefore, their maximum embedding capacity is approximately 0.5 bpp.

2.2. Reduced Difference Expansion Scheme

In the DE-based RDH schemes, for embedding, the difference value is expanded to generate the space to embed secret data. It means that, in these schemes, the original value is modified at least twice, causing the low image quality. To improve the embedding capacity, Lui et al. [20] introduced the new DE-based algorithm. In their scheme, the difference value of each pixel pair is calculated as was done in [14,19]. Then, the original difference value is reduced according to Equation (4).
v ¯ i = { v i 2 l o g 2 | v i | 1 ,                   i f | v i | > 1       v i ,                                         otherwise        
where v i and v ¯ i are original and reduced difference values, respectively. Then, each reduced difference value is used to hide one secret bit.
By using the RDE algorithm for embedding data, Liu et al.’s scheme improved the image quality of stego-images. However, their embedding capacity is still low, when it is equal to 0.5 bpp.

3. Proposed Algorithm

In this section, our DE-based RDH algorithm is presented in detail. To improve the embedding capacity and the image quality, the two following techniques are applied in the proposed scheme.
(1)
Secret message encoding: For fair comparison, the generated secret data, based on the symmetry concept, means the secret bits should be random and the distribution of the secret data remains uniform. Then, two adjacent bits of the secret data are converted into decimal form.
(2)
The ERDE technique: Each original difference value of the pixel pair is reduced before expanding for data embedding.
In the proposed scheme, the cover image is divided into 2 × 2 non-overlapping blocks. In each of these blocks, the smallest pixel is used as a base point to compute the difference values (DV). Next, the determined threshold T 1 is used to classify which DV values are to be embedded or to be reduced. If the DV values are larger than T 1 , the ERDE technique is used to narrow the DV value for embedding data. Moreover, to maintain the tradeoff between the embedding capacity and the image quality in the data-embedding process, the second threshold T 2 is used. If DVs of a block after reducing are smaller than T 2 , they are used for embedding secret bits. Otherwise, they are kept unchanged. The flowchart of our proposed scheme is presented in Figure 1.
The data embedding and extraction procedure are described in detail as follows:

3.1. The Data Embedding Procedure

To embed the message S into the cover image I , the eight following steps are used in the data-embedding algorithm:
Step 1. Encode the message S into an integer sequence B with L elements, B = b i { 0 L 1 } . Two adjacent bits in S is converted into the integer value b i ; therefore,   b i ( 0 ,   1 ,   2 ,   3 ) .
Step 2. Divide the cover image I into quad blocks of the size of 2 × 2 as shown in Figure 2. Each block is then converted into a vector, which is given as p = ( p 0 ,   p 1 ,   p 2 ,   p 3 ) .
Step 3. Determine the minimum value by sorting the vector p in assending order. Obtain the vector u i = ( u 0 ,   u 1 , u 2 ,   u 3 ) , with u 0   u 1 u 2   u 3
Step 4. Compute the difference value d i by using Equation (5).
{ d 1 = u 1 u 0 d 2 = u 2 u 0 d 3 = u 3 u 0
where u 0 ,   u 1 , u 2 and   u 3 are four pixels of the quad block, and d i is the difference between two pixels.
Step 5. Enhance the reduced difference value: A threshold T 1 is given to determine whether d i should be reduced or not. In the proposed scheme, if the difference is less than a given threshold T 1 , we use the original difference for data embedding without reduction. Otherwise, if d i T 1 , this difference value d i is reduced by using the ERDE technique according to Equation (6). Otherwise, this original difference value is unchanged and moves to Step 6.
d ¯ i = { d i 2 n 1 ,   i f   2 n d i 2 n + 1                                     d i ( 2 n 1 + 2 ) ,   i f   2 n + 2 d i 3 × 2 n 1 1         d i 2 n ,   i f   3 × 2 n 1 d i 3 × 2 n 1 + 1                   d i ( 2 n + 2 ) ,   i f   3 × 2 n 1 + 2 d i 4 × 2 n 1 1
where d i and d ¯ i are the original and reduced difference values of two pixels, respectively, and n = l o g 2 d i .
To effectively extract data and restore the original image, the location map L M is constructed according to Equation (7).
L M = { 0 ,     i f   2 n d i 2 n + 1                                         1 ,     i f   2 n + 2 d i 3 × 2 n 1 1                       2 ,     i f   3 × 2 n 1 d i 3 × 2 n 1 + 1                   3 ,     i f   3 × 2 n 1 + 2 d i 4 × 2 n 1 1          
where d i is the original difference value of two pixels, and n = l o g 2 d i .
Step 6. Data embedding: A threshold T 2 is given to determine whether the reduced difference d ¯ i is suitable to embed the secret data or not.
If d ¯ i T 2 , d ¯ i is expanded to embed the secret value b i according to Equation (8). Otherwise, d ¯ i is non-embeddable and the coordinate of this block is recorded into the vector M by setting M ( k ) = 1 , where k is the k t h block.
d ̳ i = 2 2 × d ¯ i + b i
where d ̳ i is the result of the difference value after te embedding process, and b i is the secret data, and b i ( 0 ,   1 ,   2 ,   3 )
Step 7. The new vector u ¯ i is updated by using Equation (9).
{ u ¯ 0 = u 0           u ¯ 1 = u 0 + d ̳ 1 u ¯ 2 = u 0 + d ̳ 2 u ¯ 3 = u 0 + d ̳ 3
where u ¯ 0 , u ¯ 1 , u ¯ 2 and u ¯ 3 are four stego-pixels after data embedding.
After updating according to Equation (9), if the value of u ¯ i is less than 0 or greater than 255, overflow/underflow problems have occurred. In this case, this block is also not suitable for data embedding. Then, the block should be unchanged, and the coordinate of the block is recorded in the vector M in the same way as in Step 6. Otherwise, the new vector u ¯ i is converted into the corresponding positions of 2 × 2 blocks.
Step 8. Repeat the above steps until the whole secret bits are embedded. Then, the stego-image I is obtained. Subsequently, the extra information L M   and   M is compressed and sent to the receiver via a secure channel.

3.2. The Data Extraction Procedure

The extraction procedure on the contrary does simply the reverse of the embedding procedure. First, the extra information L M   and   M , which is received from the sender, is used for extracting. The extraction and recovery process is present in the steps below.
Step 1. Divide the stego-image I into quad blocks with the size of 2 × 2. Each block is converted into the vector u ¯ i as Steps 2 and 3 in the embedding procedure. Then, compute the difference value d ̳ i of the pixel pairs by using Equation (5).
Step 2. Extract the data B: The integer value b i is extracted by using Equation (10).
b i = d ̳ i   m o d   2 2
where m o d is the function to return the remainder after a number is divided by a divisor.
Step 3. Restore the difference value d ̳ i in Equation (11).
d ¯ i = d ̳ i 2 2
where d ¯ i is the reconstructed difference value.
Step 4. If M ( k ) = 1 , the k t h block is a non-embeddable block. Otherwise, the secret data is extracted, and this block is reconstructed as below.
According to the location map L M , the difference value d i is recovered by using the iERDE technique in Equation (12); otherwise, d i is equal to d ¯ i .
d i = { d ¯ i + 2 n ,   i f   LM = 0   d ¯ i + 2 n + 2 ,   i f   LM = 1 d ¯ i + 2 n + 1 ,   i f   LM = 2 d ¯ i + 2 n + 1 + 2 ,   i f   LM = 3    
where n = l o g 2 d ¯ i , and d i is the difference after restoration to the original difference.
Step 5. Restore the original vector u i by using Equation (13).
{ u 0 = u ¯ 0           u 1 = u ¯ 0 + d 1   u 2 = u ¯ 0 + d 2   u 3 = u ¯ 0 + d 3
where u 0 ,   u 1 , u 2 and   u 3 are four restored pixels of the quad block.
Then, the vector u i is converted into the corresponding positions in the current block.
Step 6. Repeat the above steps until the whole blocks are processed completely. The original image is obtained. Then, each extracted value b i is converted into two secret bits. The message S is conducted by concatenating two bits into the original string.

3.3. Example of the Proposed Scheme

3.3.1. An Example of the Embedding Process

Assume that the quad block of the grayscale image I is shown in Figure 3a. Allow two thresholds, T1 = 2 and T2 = 10; the example of the embedding process is presented as follows:
Step 1. Encode the message: Assume that the binary secret bits, S =   011011 , is embedded. Then, it is encoded into the integer values B =   1   2   3
Step 2. Transform the block into the vector p = ( 126 ,   141 ,   151 ,   136 )
Step 3. Sort the vector p in an ascending order to obtain vector u = ( 126 ,   136 ,   141 ,   151 )
Step 4. Compute the difference values d i by using Equation (5).
{ d 1 = 136 126 = 10   d 2 = 141 126 = 15 d 3 = 151 126 = 25
Step 5. The given threshold T 1 = 2   , so d i T 1 . Then, reduce the difference value d i by using Equation (6).
n = l o g 2 d i = l o g 2 10 = 3 ,   t h e n ,   2 3 10 2 3 + 1 d ¯ 1 = d i ( 2 n 1 + 2 ) = 10 ( 2 3 1 + 2 ) = 4 L M = 1 n = l o g 2 d i = l o g 2 15 = 3 ,   t h e n ,   3 × 2 3 1 + 2 15 4 × 2 3 1 1 d ¯ 2 = d i ( 2 n + 2 ) = 15 ( 2 3 + 2 ) = 5 L M = 3 n = l o g 2 d i = l o g 2 25 = 4 ,   t h e n ,   3 × 2 4 1 25 3 × 2 4 1 + 1 d ¯ 3 = d i 2 n = 25 2 4 = 9 L M = 2
Step 6. Embed the data: If d ¯ i T 2 , then d ¯ i are expanded to embed the secret data by using Equation (8).
d ̳ 1 = 2 2 × d ¯ 1 + b 1 = 2 2 × 4 + 1 = 17
d ̳ 2 = 2 2 × d ¯ 2 + b 2 = 2 2 × 5 + 2 = 22 d ̳ 3 = 2 2 × d ¯ 3 + b 3 = 2 2 × 9 + 3 = 39
Step 7. Update the new vector u ¯ i using Equation (9)
{ u ¯ 0 = u 0 = 126   u ¯ 1 = u 0 + d ̳ 1 = 126 + 17 = 143 u ¯ 2 = u 0 + d ̳ 2 = 126 + 22 = 148 u ¯ 3 = u 0 + d ̳ 3 = 126 + 39 = 165
Step 8. Reverse the convert vector u ¯ i into the correct corresponding positions of the stego-block as shown in Figure 3b.

3.3.2. An Example of the Extraction Process

Step 1. First, the stego-block is transformed into the vector p ¯ . Next, sort the vector p in ascending order to obtain the vector u ¯ = ( 126 ,   143 ,   148 ,   165 ) . Then, calculate the difference values d ̳ i by using Equation (5).
{ d ̳ 1 = 143 126 = 17   d ̳ 2 = 148 126 = 22 d ̳ 3 = 165 126 = 39
Step 2. Extract the embedded data B. The integer values b i are extracted in Equation (10).
b 1 = d ̳ 1   m o d   2 2 = 17   m o d   4 = 1 b 2 = d ̳ 2   m o d   2 2 = 22   m o d   4 = 2 b 3 = d ̳ 3   m o d   2 2 = 39   m o d   4 = 3
Convert a sequence of the integer values B = 1   2   3 into the original secret bits S = 011011
Step 3. Restore the difference values d ¯ i by using Equation (11)
d ¯ 1 = d ̳ 1 2 2 = 17 2 2 = 4 d ¯ 2 = d ̳ 2 2 2 = 22 2 2 = 5 d ¯ 3 = d ̳ 3 2 2 = 39 2 2 = 9
Step 4. Calculate the original difference values d i by using Equation (12).
n = l o g 2 d ¯ 1 = l o g 2 4 = 2 LM = 1 d 1 = d ¯ 1 + 2 n + 2 = 4 + 2 2 + 2 = 10 n = l o g 2 d ¯ 2 = l o g 2 5 = 2 LM = 3 d 2 = d ¯ i + 2 n + 1 + 2 = 5 + 2 2 + 1 + 2 = 15 n = l o g 2 d ¯ 3 = l o g 2 9 = 3 LM = 2 d 3 = d ¯ i + 2 n + 1 = 9 + 2 3 + 1 = 25
Step 5. Restore the original vector u i using Equation (13).
{ u 0 = u ¯ 0 = 126   u 1 = u ¯ 0 + d 1 = 126 + 10 = 136 u 2 = u ¯ 0 + d 2 = 126 + 15 = 141 u 3 = u ¯ 0 + d 3 = 126 + 25 = 151
Finally, convert the vector u i into correctly corresponding positions of the original block as shown in Figure 3c.

4. Experimental Results

In this section, we present the experimental results of the proposed scheme. These results are experimented on ten common grayscale images. All the images are 512 × 512 with different complexity including Lena, Baboon, Peppers, Barbara, Airplane, Boat, Lake, Livingroom, Pirate and Woman, as shown in Figure 4. The experimental environment is MATLAB R2014a running on Microsoft Windows 10 Professional 64-bits, and the processor platform is an Intel(R) Core (TM) i7-8700U CPU (12MB Cache, 3.20 GHz), 8 GB of RAM DDR4 memory.
The proposed scheme achieves high performance in terms of the embedding capacity and the visual quality. In this scheme, the message in binary form is first converted into decimal form, then one decimal is embedded into each difference value. Due to one decimal value being equal to two bits, the bit rate of the proposed scheme would certainly improve twice compared to previous schemes. This is becauese only one secret bit is embedded into the pixel pair in previous schemes. In their scheme, the expansion of difference values for embedding decimal values may lead to a negative impact on the image quality and there will also be overflow/underflow problems. To solve this problem, we proposed a new algorithm to reduce the original difference value using an improved ERDE technique. In the proposed ERDE technique, the difference value is minimum modified to embed the secret decimal value. It means the large amounts of secret bits can be embedded while maintaining good imperceptibility and avoiding the overflow/underflow problems.
To compare the image quality, the peak signal-to-noise ratio (PSNR) is used to calculate the visual similarity between a cover image and a stego-image. The PSNR is calculated as Equation (14).
P S N R = 10 × l o g 10 ( 255 2 M S E )
where MSE is the mean squared error representing the difference between the cover image and stego-image and is calculated as Equation (15).
M S E = 1 m × n i = 1 m j = 1 n ( p i , j p ¯ i , j ) 2
with m and n as the height and width of the image, respectively, and p i , j and p ¯ i , j refer to the pixels coordinate at the ith row and jth column of the cover image and stego-image, respectively.
Beside the PSNR, the embedding capacity (EC) and bit per pixel (bpp) are also common factors to evaluate the performance of the RDH schemes. The EC is the number of bits which are embedded inside the cover image. The bpp is determined based on the rate of bits which is embedded into one pixel.
To improve the PSNR value, we applied the proposed ERDE algorithm with an optimal reduced threshold T 1 . In our experiment, with T 1 equal to 2, the ERDE scheme achieves the best performance. In the proposed scheme, the difference values are first reduced by ERDE technique, and then two bits are encoded into decimal and embedded into one reduced value. This leads to the proposed scheme to improve the embedding capacity while maintaining a good visual image. Additionally, to prevent the overflow/underflow problems, the embedding threshold T 2 is used to decide whether a block is embeddable or non-embeddable. The block is embeddable if the difference value of this block is smaller than or equal to T 2 ; otherwise, this block is ignored. Depending on the length of the secret data, the value of T2 is selected accordingly. A large value of T 2 means more data to be embedded and more distortion in the cover image. Moreover, if T2 is too large, overflow/underflow problems may occur. In the experiment, we try to test several T 2 with values of 2, 4, 6, 8, 10. Table 1 shows overflow/underflow blocks of common images with T2 = 10 and T2 = 12.
To evaluate how the threshold T 2 impacts on PSNR and EC, the Figure 5 shows the embedding capacity and the image quality of the Lena image with different values of T2. We see that when T2 is increased, the number of embedded bits significantly increases. However, the quality of the stego-image Lena decreases.
To evaluate the performance of the proposed scheme, the comparison of the embedding capacity and image quality between the proposed scheme and previous schemes, including Arham et al.’s scheme [22], Ntahobari & Ahamd’s scheme [23] and Maniriho et al.’s scheme [28], are shown in Table 2. It can be seen in Table 2, with T2 = 12, that the proposed scheme achieves higher embedding capacity than T2 = 10. However, the overflow/underflow problems will occur in some images with T2 = 12. In the proposed scheme, the best result of EC and PSNR is obtained when the value of T2 is in the range of [2, 10].
In the proposed scheme, each difference value can embed two bits after applying the ERDE technique. As a result, our average embedding capacity of all test images is up to 311,966 bits, whereas the EC of Arham et al. [22], Ntahobari & Ahamd scheme [23], and Maniriho et al.’s scheme [28] is 177,924 bits, 185,284 bits and 242,146 bits, respectively. Although the EC increased by 68%, the proposed scheme also achieves a better visual image than that of Ntahobari & Ahamd’s scheme, which reached 33.43 dB and 31.95 dB, respectively. From Table 2, the PSNR value of the proposed scheme slightly decreased compared to Arham et al.’s scheme with maximum data embedding. However, when two schemes are embedded the same embedding capacity, the PSNR value of the proposed scheme is always better than that of Arham et al.’s scheme.
To demonstrate the outstanding effectiveness of the proposed scheme, the PSNR comparison in dB between the proposed scheme and previous schemes is shown in Figure 6a–j. From the graph, we can see that in most cases, the proposed scheme is better than the other schemes with the same embedding capacity rate. Moreover, the proposed scheme can obtain a much higher maximum EC than previous schemes. For example, the EC of the proposed scheme for the Lena image is greater than 350,000 bits. However, for Arham et al.’s scheme [22] and Ntahobari & Ahamd’s scheme [23], the EC is only around 190,000 bits and 194,000 bits, respectively.

5. Conclusions

In this paper, we propose a new RDH scheme based on enhanced reduced difference expansion of a quad-block. In the proposed scheme, the ERDE technique is used to reduce the original difference value and the secret data are encoded into decimal values for embedding. Experimental results show that the proposed scheme achieves high performance in terms of the embedding capacity and the image quality in comparison with previous works. Moreover, by using the ERDE technique, the proposed scheme could avoid the overflow/underflow problems. In addition, the proposed scheme ensures reversibility and can be applied to special fields such as medical, military, and digital forensics.

Author Contributions

Conceptualization, T.-S.N. and V.-T.H.; methodology, T.-S.N.; software, V.-T.H.; validation, T.-S.N., V.-T.H. and P.-H.V.; formal analysis, V.-T.H.; investigation, T.-S.N.; resources, T.-S.N.; data curation, V.-T.H.; writing—original draft preparation, V.-T.H.; writing—review and editing, T.-S.N. and P.-H.V.; visualization, V.-T.H.; supervision, T.-S.N.; project administration, T.-S.N.; funding acquisition, T.-S.N. All authors have read and agreed to the published version of the manuscript.

Funding

This study was fully supported by the Tra Vinh University under grant contract number 211/HĐ.HĐKH—ĐHTV.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data available on request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  2. Jung, K.-H. A Survey of Reversible Data Hiding Methods in Dual Images. IETE Tech. Rev. 2016, 33, 441–452. [Google Scholar] [CrossRef]
  3. Arai, E.; Imaizumi, S. High-Capacity Reversible Data Hiding in Encrypted Images with Flexible Restoration. J. Imaging 2022, 8, 176. [Google Scholar] [CrossRef] [PubMed]
  4. Chang, C.-C.; Su, G.-D.; Lin, C.-C.; Li, Y.-H. Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry 2022, 14, 509. [Google Scholar] [CrossRef]
  5. Yu, C.; Zhang, X.; Li, G.; Zhan, S.; Tang, Z. Reversible data hiding with adaptive difference recovery for encrypted images. Inf. Sci. 2022, 584, 89–110. [Google Scholar] [CrossRef]
  6. Vo, P.-H.; Nguyen, T.-S.; Huynh, V.-T.; Do, T.-N. A novel reversible data hiding scheme with two-dimensional histogram shifting mechanism. Multimed. Tools Appl. 2018, 77, 28777–28797. [Google Scholar] [CrossRef]
  7. Vo, P.H.; Nguyen, T.S.; Huynh, V.T.; Do, T.N. A robust hybrid watermarking scheme based on DCT and SVD for copyright protection of stereo images. In Proceedings of the 2017 4th NAFOSTED Conference on Information and Computer Science, Hanoi, Vietnam, 24–25 November 2017; pp. 331–335. [Google Scholar]
  8. Nguyen, T.-S. Fragile watermarking for image authentication based on DWT-SVD-DCT techniques. Multimed. Tools Appl. 2021, 80, 25107–25119. [Google Scholar] [CrossRef]
  9. Nguyen, T.-S.; Chang, C.-C.; Yang, X.-Q. A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU—Int. J. Electron. Commun. 2016, 70, 1055–1061. [Google Scholar] [CrossRef]
  10. Di, F.; Zhang, M.; Huang, F.; Liu, J.; Kong, Y. Reversible data hiding in JPEG images based on zero coefficients and distortion cost function. Multimed. Tools Appl. 2019, 78, 34541–34561. [Google Scholar] [CrossRef]
  11. Xie, X.-Z.; Lin, C.-C.; Chang, C.-C. A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multimed. Tools Appl. 2019, 78, 11443–11462. [Google Scholar] [CrossRef]
  12. Liu, Y.; Chang, C.-C. Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients. Displays 2018, 51, 51–56. [Google Scholar] [CrossRef]
  13. Hou, D.; Wang, H.; Zhang, W.; Yu, N. Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 2018, 148, 41–47. [Google Scholar] [CrossRef]
  14. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef]
  15. Ni, Z.; Shi, Y.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar] [CrossRef]
  16. Fu, D.-S.; Jing, Z.-J.; Zhao, S.-G.; Fan, J. Reversible data hiding based on prediction-error histogram shifting and EMD mechanism. AEU—Int. J. Electron. Commun. 2014, 68, 933–943. [Google Scholar] [CrossRef]
  17. Rad, R.M.; Wong, K.; Guo, J.-M. Reversible data hiding by adaptive group modification on histogram of prediction errors. Signal Process. 2016, 125, 315–328. [Google Scholar] [CrossRef]
  18. Pan, Z.; Hu, S.; Ma, X.; Wang, L. Reversible data hiding based on local histogram shifting with multilayer embedding. J. Vis. Commun. Image Represent. 2015, 31, 64–74. [Google Scholar] [CrossRef]
  19. Alattar, A.M. Reversible watermark using difference expansion of quads. In Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, QC, Canada, 17–21 May 2004; Volume 3, p. iii-377. [Google Scholar]
  20. Liu, C.-L.; Lou, D.-C.; Lee, C.-C. Reversible Data Embedding Using Reduced Difference Expansion. In Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26–28 November 2007; Volume 1, pp. 433–436. [Google Scholar]
  21. Ahmad, T.; Holil, M.; Wibisono, W.; Muslim, I.R. An improved Quad and RDE-based medical data hiding method. In Proceedings of the 2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM), Yogyakarta, Indonesia, 3–4 December 2013; pp. 141–145. [Google Scholar]
  22. Arham, A.; Nugroho, H.A.; Adji, T.B. Multiple layer data hiding scheme based on difference expansion of quad. Signal Process. 2017, 137, 52–62. [Google Scholar] [CrossRef]
  23. Ntahobari, M.; Ahmad, T. Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion. Int. J. Electr. Comput. Eng. 2018, 8, 2468–2476. [Google Scholar] [CrossRef]
  24. Syahlan, Z.; Ahmad, T. Reversible data hiding method by extending reduced difference expansion. Int. J. Adv. Intell. Inform. 2019, 5, 101–112. [Google Scholar] [CrossRef]
  25. Kukreja, S.; Kasana, S.S.; Kasana, G. Histogram based multilevel reversible data hiding scheme using simple and absolute difference images. Multimed. Tools Appl. 2019, 78, 6139–6162. [Google Scholar] [CrossRef]
  26. Al-Qershi, O.M.; Khoo, B.E. High capacity data hiding schemes for medical images based on difference expansion. J. Syst. Softw. 2011, 84, 105–112. [Google Scholar] [CrossRef]
  27. Al-Qershi, O.M.; Ee Khoo, B. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process. 2013, 93, 154–162. [Google Scholar] [CrossRef]
  28. Maniriho, P.; Mahoro, L.J.; Bizimana, Z.; Niyigaba, E.; Ahmad, T. Reversible difference expansion multi-layer data hiding technique for medical images. Int. J. Adv. Intell. Inform. 2021, 7, 1–11. [Google Scholar] [CrossRef]
Figure 1. The flowchart of the proposed scheme.
Figure 1. The flowchart of the proposed scheme.
Symmetry 14 01726 g001
Figure 2. The block of quad pixels.
Figure 2. The block of quad pixels.
Symmetry 14 01726 g002
Figure 3. An example of a quad block for data embedding and extraction process. (a) Before embedding; (b) After embedding; (c) After extraction.
Figure 3. An example of a quad block for data embedding and extraction process. (a) Before embedding; (b) After embedding; (c) After extraction.
Symmetry 14 01726 g003
Figure 4. Experimental image dataset. (a) Lena; (b) Baboon; (c) Peppers; (d) Barbara; (e) Airplane; (f) Boat; (g) Lake; (h) Livingroom; (i) Pirate; (j) Woman.
Figure 4. Experimental image dataset. (a) Lena; (b) Baboon; (c) Peppers; (d) Barbara; (e) Airplane; (f) Boat; (g) Lake; (h) Livingroom; (i) Pirate; (j) Woman.
Symmetry 14 01726 g004
Figure 5. The EC and PSNR comparison of Lena image with different T2.
Figure 5. The EC and PSNR comparison of Lena image with different T2.
Symmetry 14 01726 g005
Figure 6. The PSNR comparison between the proposed scheme and three previous schemes. (a) Lena; (b) Baboon; (c) Peppers; (d) Barbara; (e) Airplane; (f) Boat; (g) Lake; (h) Livingroom; (i) Pirate; (j) Woman.
Figure 6. The PSNR comparison between the proposed scheme and three previous schemes. (a) Lena; (b) Baboon; (c) Peppers; (d) Barbara; (e) Airplane; (f) Boat; (g) Lake; (h) Livingroom; (i) Pirate; (j) Woman.
Symmetry 14 01726 g006aSymmetry 14 01726 g006bSymmetry 14 01726 g006c
Table 1. The number of block overflows/underflows with T2 = 10 and T2 = 12.
Table 1. The number of block overflows/underflows with T2 = 10 and T2 = 12.
T2 = 10T2 = 12
ImageECOverflow/UnderflowECOverflow/Underflow
Airplane344,4180353,6940
Baboon191,6220219,4860
Barbara271,4520288,10890
Boat323,5260341,41843
Lena357,7560367,3441
Peppers352,7400364,5900
Lake308,3640327,1927
Livingroom311,31613330,63018
Pirate328,2360344,9160
Woman330,2340345,7680
Table 2. The EC (bit) and PSNR (dB) comparison between the proposed and previous schemes.
Table 2. The EC (bit) and PSNR (dB) comparison between the proposed and previous schemes.
ImagesArham et al. [22]Ntahobari & Ahamd [23]Maniriho et al. [28]Proposed (T2 = 10)
ECPSNRECPSNRECPSNRECPSNRECPSNR
Airplane184,35936.46188,88633.43371,12431.11184,35937.94344,41834.38
Baboon146,68231.57160,27228.5877,70933.15146,68234.45191,62233.29
Barbara160,74933.44175,04430.25220,57531.22160,74935.97271,45233.77
Boat182,47533.21189,12331.67199,78230.06182,47534.86323,52632.26
Lena190,74335.55194,07033.80356,85630.25190,74336.93357,75633.87
Peppers189,30634.61191,97633.13266,49329.56189,30635.46352,74032.60
Lake179,44836.24186,55234.02214,21533.61179,44838.12308,36435.74
Livingroom178,41633.39187,40430.74208,80030.27178,41635.02311,31632.54
Pirate184,08333.80190,40131.83263,03430.48184,08335.46328,23632.97
Woman182,98234.06189,10832.04242,86829.86182,98235.25330,23432.91
Average177,92434.23185,28431.95242,14630.96177,92435.95311,96633.43
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nguyen, T.-S.; Huynh, V.-T.; Vo, P.-H. A Novel Reversible Data Hiding Algorithm Based on Enhanced Reduced Difference Expansion. Symmetry 2022, 14, 1726. https://doi.org/10.3390/sym14081726

AMA Style

Nguyen T-S, Huynh V-T, Vo P-H. A Novel Reversible Data Hiding Algorithm Based on Enhanced Reduced Difference Expansion. Symmetry. 2022; 14(8):1726. https://doi.org/10.3390/sym14081726

Chicago/Turabian Style

Nguyen, Thai-Son, Van-Thanh Huynh, and Phuoc-Hung Vo. 2022. "A Novel Reversible Data Hiding Algorithm Based on Enhanced Reduced Difference Expansion" Symmetry 14, no. 8: 1726. https://doi.org/10.3390/sym14081726

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop