You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

29 March 2025

Frequency-Domain Steganography with Hexagonal Tessellation for Vision–Linguistic Knowledge Encapsulation

,
,
and
1
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2
Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue New Technologies for Cybersecurity

Abstract

With the rapid development of technologies such as vision–language modeling, sharing images with corresponding descriptions has become a common means of information transfer. Studying data-hiding techniques for JPEG images can protect sensitive descriptions, such as personal information associated with them while sharing images. Therefore, research on data-hiding techniques for JPEG images is of significant importance. However, existing methods that modify discrete cosine transform (DCT) coefficients still have room for improvement in increasing their embedding capacity while minimizing file size expansion. To address this issue, this paper proposes a knowledge encapsulation method for JPEG images using a special hexagonal tessellation matrix. First, a special hexagonal tessellation matrix is constructed based on the characteristics of non-zero AC coefficients. Then, non-zero AC coefficients in JPEG images are paired to form coordinate pairs, and the data are embedded by modifying the non-zero AC coefficient pairs into the coordinates corresponding to the secret data. Experimental results demonstrate that, compared to the previously proposed JPEG image data-hiding schemes, the proposed approach achieves a higher embedding capacity, a minimal file size increase (FSI), and an acceptable peak signal-to-noise ratio (PSNR).

1. Introduction

In the digital era, the combination of images and textual descriptions has become a primary means of information transmission. This integration of visual and textual content is ubiquitous across both everyday and professional domains: social media posts pair personal photographs with emotional narratives, news reports combine field photography with detailed descriptions, medical systems link diagnostic information with medical images, and geographic information systems associate satellite imagery with precise location data and environmental parameters. This multimodal approach to information transmission not only enriches content delivery but also presents significant research opportunities in artificial intelligence.
Recent advances in multimodal artificial intelligence technologies, particularly vision–language models (VLMs), have been remarkable. These models demonstrate sophisticated capabilities in image comprehension, intelligent text–image correlation, and description generation from visual inputs. While this technological progress has enhanced the automated processing of multimodal content, it has also introduced new security challenges. As illustrated in Figure 1a, when descriptive text contains sensitive information (such as medical records, personal identification data, or trade secrets), direct transmission alongside images risks unauthorized access or malicious manipulation. To address these security concerns, data hiding [1,2,3,4,5,6,7,8] offers an effective solution, as shown in Figure 1b, enabling secure transmission by embedding textual information within images. However, traditional data-hiding methods, primarily designed for uncompressed images, face significant challenges in practical scenarios where JPEG compression is prevalent.
Figure 1. This is a diagram comparing the security of data transmission with and without steganography protection. (a) Without protecting the data with steganography, the attacker can discover and tamper with the data. (b) Data are protected using steganography, and it is difficult for the attacker to discover the secret data.
JPEG compression is a fundamental image compression technology that employs a lossy algorithm to significantly reduce file sizes, lowering both storage and transmission costs. The algorithm leverages human visual system characteristics to compress high-frequency components that are imperceptible to human observers, thus preserving images’ visual quality. Additionally, JPEG allows users to adjust the compression quality factor (QF), enabling a customizable balance between image quality and file size. As an international standard, JPEG is supported by nearly all operating systems, devices, and applications, ensuring compatibility and cross-platform usability. In the context of rapid internet development, images have become a dominant content format. For resource-constrained devices like smartphones, JPEG’s efficient compression and decoding mechanisms make it the preferred format for sharing images on social media. Despite the emergence of advanced compression technologies, JPEG maintains its prominence in digital imaging due to its technical maturity, ubiquitous support, and operational flexibility. However, an inherent conflict exists between data-hiding techniques, which rely on redundancy, and compression algorithms, which aim to eliminate it. Consequently, balancing hiding capacity, image fidelity, and file size in JPEG images remains a critical research challenge.
This paper proposes a novel JPEG image knowledge encapsulation method based on hexagonal tessellation. Our approach begins by constructing a specialized matrix plane without zero coordinates, filled with hexagonal patterns. During JPEG compression, non-zero AC coefficients are paired to form coordinates. Secret data embedding is achieved by modifying these AC coefficient pairs according to coordinates corresponding to the secret data in the hexagon-filled matrix. Experimental results demonstrate that the generated stego images maintain PSNR values close to the original, allowing recipients to interpret image content without original image restoration. Recipients can extract the hidden data by pairing non-zero AC coefficients from the received stego JPEG image and matching them against the hexagon-filled matrix. Compared to existing JPEG data-hiding methods, our approach achieves a superior embedding capacity while maintaining a visual quality similar to the original image and minimizing any file size increments.

3. Proposed Scheme

In this section, we will introduce a method using a special hexagonal tessellation matrix to embed secret data into the non-zero AC pairs. This section first introduces the special hexagonal tessellation matrix construction method, followed by the data-embedding process, and concludes with the extraction of secret data. Figure 3 presents the framework of the proposed method, which will be explained in detail in the subsequent sections.
Figure 3. The framework of the proposed method.

3.1. Special Hexagonal Tessellation Matrix Construction

The method of hiding data by filling hexagons in the matrix plane was first proposed by Chang et al. [2,3,4,5,6], who named this matrix the turtle shell matrix. This method requires the data hider to construct a 256 × 256 reference matrix overlaid with turtle shells. Within this matrix, adjacent elements differ by 1 along the X-axis, while along the Y-axis, the differences alternate between 2 and 3. The construction function is defined in Equation (1), where (x, y) represent the coordinates of the matrix, and the range of x and y is [0, 255]. Multiple non-overlapping turtle shells are placed within the reference matrix (such as the blue hexagons in Figure 4), each containing eight numbers ranging from 0 to 7. These numbers consist of six elements along the shell’s edge and two elements on its back. By using pixel pairs from the cover image as matrix coordinates, a decimal number can be identified within a turtle shell. During the embedding process, secret data are first converted into decimal form. If the coordinate value of a pixel pair matches the embedded data, no modification is required. Otherwise, adjustments are made based on the position of the embedded value: If the coordinate lies on the turtle’s back, it is replaced with the coordinate of the embedded data found within the same turtle shell. If the coordinate is on the turtle shell’s edge, adjacent shells are examined to find the closest coordinate corresponding to the embedded data, which is then used for replacement. If the coordinate is outside the turtle shell, located at the matrix boundary, the nearest 3 × 3 block is searched to find and replace the coordinate with the embedded data. Figure 4 illustrates the embedding and extraction process of Chang et al.’s scheme.
m a t r i x x , y = ( x   m o d   8 ) + y 2 × 5 + y 2 × y 2 × 2 m o d   8 .
Figure 4. This is an example of a turtle shell matrix.
Let us assume an example where pixel pairs (2, 3) and (6, 5) from the cover image need to embed the binary secret information ( 100   100 ) , which corresponds to the decimal values 4 and 4. In the figure, pixel pair coordinates are marked with purple, while the secret information is highlighted in red. To embed the first secret number 4 into pixel pair (2, 3), we need to locate pixel pair (2, 3) in the reference matrix. Since (2, 3) is positioned on the turtle’s back and its corresponding element does not match the embedded data, we replace it with the coordinate (2, 4), marked with a red triangle, where the embedded data are located. Next, to embed the second secret number 4 into pixel pair (6, 5), we observe that (6, 5) is on the turtle shell’s edge. We then examine adjacent turtle shells to find the nearest coordinate corresponding to the secret number 4. The closest matching coordinate is (5, 6), marked with a red triangle, which replaces the original pixel pair (6, 5).
During the extraction process, the receiver simply maps the stego pixel pairs (2, 4) and (5, 6) back onto the reference matrix to retrieve the decimal secret data 4 and 4. Converting these values to binary restores the original secret information ( 100   100 ) . Similar to the method of Chang et al. [2], our proposed hexagonal tessellation embedding method first requires constructing a special matrix. We consider the coordinate (1, 1) as the origin and assign it a value of 0. Then, for the values along the X-axis, the difference between every two adjacent values is 1. For the values along the Y axis, the difference between every two adjacent values is 2 and 3, alternately. Eventually, a special hexagonal tessellation matrix is constructed, where the X-axis coordinate range is [ 1024 , 1 ] [ 1 , 1023 ] , and the Y-axis coordinate range is [ 1024 , 1 ] [ 1 , 1023 ] . It is noteworthy that the special hexagonal tessellation matrix we constructed deliberately excludes a zero axis. This design decision stems from our scheme’s fundamental approach of embedding data exclusively within non-zero AC coefficients. The inclusion of a zero axis in the hexagonal tessellation matrix would potentially result in the modification of corresponding AC coefficients to zero during the embedding process, consequently affecting both the encoding of the compressed file and the visual quality of the resulting stego image. The specific matrix construction formula is as follows:
m a t r i x x , y = x 1 m o d   8 + y 1 2 × 5 + y 1 y 1 2 × 2 × 2 m o d   8 ,   1023 x 1,1023 y 1 x 1 m o d   8 + y 2 × 5 y y 2 × 2 × 3 m o d   8 ,   1023 x 1 , 1024 y 1 x   m o d   8 + y 1 2 × 5 + y 1 y 1 2 × 2 × 2 m o d   8 , 1024 x 1,1023 y 1 x   m o d   8 + y 2 × 5 y y 2 × 2 × 3 m o d   8 ,   1024 x 1 , 1024 y 1 ,
where m a t r i x x , y means the matrix value of the coordinate ( x , y ). In the special hexagonal tessellation matrix, each hexagon is distributed with values from 0 to 7. Multiple non-overlapping hexagons are placed within the matrix (such as the blue hexagons in Figure 5). We can see an example of an hexagonal tessellation matrix in Figure 5.
Figure 5. This is an example of a hexagonal tessellation matrix.

3.2. Data Hiding Process

After partitioning the image I into non-overlapping 8 × 8 pixel blocks, the spatial-domain data are transformed into the frequency domain using Equations (3) and (4). The computed DCT coefficients are then quantized by dividing them with the JPEG quantization table corresponding to the desired compression quality factor (QF). The quantized DCT coefficients are subsequently read in a zigzag scanning order, converting the two-dimensional representation of the quantized DCT coefficients within each block into a one-dimensional sequence. In each 8 × 8 block, the first coefficient is the DC coefficient, while the remaining 63 are AC coefficients. All non-zero AC coefficients from the blocks are paired into coordinate groups, and each group corresponds to a point P in a special hexagonal tessellation matrix. For every 3 bits of secret data read, they are converted into a decimal value N ( N [ 0,7 ] ).
D C T u , v = C ( u ) C ( v ) × i = 0 7 j = 0 7 f ( i , j ) cos ( 2 i + 1 16 u π ) cos ( 2 j + 1 16 v π ) ,
C w = 1 8   w = 0 0.5   w 0 ,
where u and v are the rows and columns of the block.
The embedding process first determines whether the point P corresponding to the non-zero AC coefficient pair is located inside a hexagon or on its edge within the matrix. If point P is inside a hexagon, the data hider finds the position of value N within the same hexagon and modifies the non-zero AC coefficient pair to match the coordinates of value N , thereby completing the data embedding. For example, as shown in Figure 6, the non-zero AC coefficient pair (−5, −3) enclosed in a purple box corresponds to point 3 inside a blue hexagon. To embed the secret data 101 2 = 5 10 , the data hider finds the position of 5 within the same hexagon corresponding to (−5, −3) and modifies the non-zero AC coefficient pair to (−6, −2), embedding the secret data 101.
Figure 6. This is an example of data embedding.
If point P lies on the edge of the hexagon, there are three adjacent shells associated with it. The data hider identifies the position of value N closest to point P within these three hexagons and modifies the non-zero AC coefficient pair. For example, in Figure 6, the non-zero AC coefficient pair (3, 2) enclosed in a purple circle corresponds to point 4, which is located on the edge of a blue hexagon. To embed the secret data 011 2 = 3 10 , the data hider identifies the closest point with a value of 3 in the adjacent hexagon, and the non-zero AC coefficient pair (3, 2) is modified to (2, 2), embedding the secret data 011. If the point P is outside the hexagon, located at the matrix boundary, the nearest 3 × 3 block is searched to find the secret value N and replace the non-zero AC coefficient pair with the coordinate. As observed in Figure 6, when the hexagonal tessellation fully covers the non-zero AC coefficient coordinate space, only a few non-zero AC coefficient pairs at the boundaries lack corresponding hexagonal regions. However, the occurrence of such boundary coefficient pairs is extremely rare. Therefore, when employing a hexagonal tessellation matrix for data embedding, nearly all non-zero AC coefficient pairs can be utilized for embedding. Additionally, each hexagonal matrix contains elements ranging from 0 to 7, allowing for the embedding of 3 bits of data per instance. In summary, using a hexagonal tessellation matrix for data embedding in JPEG images significantly enhances their embedding capacity.
This process is repeated until all secret data have been embedded. If the amount of secret data is small, a termination symbol can be appended at the end of the secret data, while the remaining unused non-zero AC coefficients remain unchanged.

3.3. Data Extraction Process

The data extraction process is simple. Upon receiving the stego JPEG file, the recipient decodes the file according to the standard JPEG coding tables to obtain the DC and AC coefficients of each block. All non-zero AC coefficients are paired into coordinate groups, each of which corresponds to a value N in the special hexagonal tessellation matrix. Each N is then converted into a 3-bit binary number. By concatenating these binary data, the secret data are reconstructed. If a termination symbol is extracted during extraction, it indicates that all the secret data have been extracted, and there are no secret data hidden in the remaining non-zero AC coefficients.

4. Discussion

In this section, a performance analysis of the method proposed in this paper is conducted, and comparisons are made with other existing methods. In the subsequent experiments, this method is tested using the six grayscale test images shown in Figure 7. These grayscale test images are from the commonly used image dataset USC-SIPI. To evaluate the performance of the proposed scheme, this invention analyzes the embedding capacity (EC) (unit: bits), file size increment (FSI) (unit: bits), entropy, file growth rate, peak signal-to-noise ratio (PSNR) (unit: dB), and Structural Similarity Index Measure (SSIM) of the proposed scheme.
M S E = 1 h × w i = 1 h j = 1 w ( O i j M i j ) 2 ,
PSNR = 10 log 10 max 2 MSE ( dB ) ,
φ o α ,   d α = 2 μ o α μ d α + c 1 2 σ o d α + c 2 μ o α 2 + μ d α 2 + c 1 σ o α 2 + σ d α 2 + c 2 ,
SSIM = 1 b α = 1 b φ ( o α ,   d α )
Figure 7. Test images. (a) Airplane; (b) Baboon; (c) Boat; (d) Lake; (e) Peppers; (f) Splash.
Equations (5) and (6) define the computation of the PSNR, while Equations (7) and (8) outline the methodology for calculating the SSIM. In Equation (5), h × w denotes the image resolution, with O i j and M i j representing the pixel in the cover and stego images, respectively. In Equation (6), the term max refers to the maximum pixel, set at 255. The PSNR is measured in decibels (dB). In Equation (7), μ and σ signify the mean and standard deviation, while constants c 1 and c 2 are assigned near-zero values to maintain stability in the SSIM computation. Equation (8) introduces b , the total number of blocks, and α , the block index.
Typically, a PSNR exceeding 30 dB implies that the distortions introduced by data embedding remain undetectable to the human eye, with higher PSNR values indicating reduced visual degradation. Similarly, SSIM values closer to 1 suggest minimal perceptual differences between the stego and cover images.
Table 1, Table 2 and Table 3 present various performance metrics of the proposed method at a maximum embedding capacity across different test images and quality factors (QFs). Since the proposed method utilizes a special hexagonal tessellation matrix embedding approach, all non-zero AC coefficient pairs can be used for secret data embedding, with each pair embedding three bits. Consequently, the proposed method achieves a higher maximum embedding capacity than other approaches. The maximum embedding capacity refers to the highest amount of information that can be embedded in the test image using the proposed scheme. Image entropy measures the level of randomness, with values closer to eight indicating greater randomness. Here, e o r i g i n a l represents the entropy of the original JPEG image, while e s t e g o denotes the entropy of the stego JPEG image. As shown in the tables, embedding the maximum amount of data slightly increases the entropy of the stego JPEG image. However, this increase is minimal, demonstrating that even at full embedding capacity, the proposed scheme has a negligible effect on the image’s overall randomness. Even when all non-zero AC coefficient pairs are used for embedding, the file size increase remains minimal, reaching a maximum of only 5.34%, regardless of compression quality. Specifically, when the QF = 90, the file size increase does not exceed 5% for any test image, which is considered acceptable.
Table 1. Performance of proposed scheme on test images when QF = 90.
Table 2. Performance of proposed scheme on test images when QF = 80.
Table 3. Performance of proposed scheme on test images when QF = 70.
In terms of visual quality, only the texture-rich Baboon image exhibits slightly lower PSNR and SSIM values. However, even for Baboon, the PSNR remains at 37.93 dB. But the maximum embedding ability of Baboon is also higher than that of other test images. Other test images maintain PSNR values above 40 dB under full embedding conditions, ensuring imperceptible visual differences to the human eye. This indicates that an observer attempting to detect hidden data based on visual quality alone would find it difficult, as the visual quality of the proposed method remains highly similar to that of the original JPEG image.
We utilized ChatGPT-4o(GPT-4-turbo) to generate corresponding descriptions for the six test images shown in Figure 7. As demonstrated in Table 4, contemporary AI technology effectively performs image analyses and generates appropriate textual descriptions. The bit requirements for encoding these textual descriptions are relatively modest; in the examples presented in Table 4, a maximum of 6000 bits sufficiently describes the test images, well within the maximum embedding capacity of our proposed method. These results confirm the feasibility of encapsulating textual descriptions within images using the proposed knowledge encapsulation method.
Table 4. Generated descriptions for images using ChatGPT-4o.
In addition, we also tested it on two color images, Baboon and Peppers. Figure 8 presents a comparison of various methods under a quality factor (QF) of 80 with a 10,000-bit embedding capacity. The results demonstrate that, using the proposed scheme, both the highly textured image Baboon and the smoother image Peppers maintain a high visual imperceptibility, making it difficult to distinguish whether data have been embedded.
Figure 8. The visual comparison between the original JPEG images and stego JPEG images for the two testing images with a QF = 80 and embedding capacity of 10,000 bits.
Additionally, our scheme is evaluated against several existing approaches. We compare four different methods at QF values of 50, 70, and 90, with the corresponding results summarized in Table 5. The table indicates that, in most cases, our method outperforms the alternatives. Specifically, while the proposed scheme does not achieve the highest PSNR for the two color test images under QF = 50 with a 1000-bit embedding and QF = 70 with a 3000-bit embedding, it is evident that as the embedding capacity increases, the PSNR of the other methods declines more rapidly, whereas our scheme exhibits a slower degradation. Consequently, Table 5 shows that with increasing data storage, the PSNR of the proposed method gradually surpasses that of the other schemes. This superior performance is attributed to our use of a hexagonal tessellation matrix embedding approach, where each pair of non-zero AC coefficients encodes three bits. As a result, fewer non-zero AC coefficients are required, and no coefficient pairs undergo shifting, thereby reducing unnecessary distortion. In contrast, other methods employ two-dimensional histogram modification, which, at higher embedding capacities, necessitates modifying a greater number of shiftable coefficient pairs to ensure correct extraction and image reversibility. This results in a substantial number of ineffective mappings, ultimately degrading the visual quality.
Table 5. Comparison of visual quality (PSNR) and file size increment (FSI) for four SOTA schemes. Three quality factors (QFs) and three different capacities are tested over two RGB images.
Regarding file size increments, our approach demonstrates a significant advantage over existing methods. Since each pair of non-zero AC coefficients embeds three bits, under the same payload, fewer non-zero AC coefficients need to be modified, with changes limited to ±1 per modification. Table 5 further reveals that while the FSI generally increases with embedding capacity, exceptions occur—such as at QF = 70, where embedding 6000 bits results in a lower FSI than embedding 3000 bits. This discrepancy arises because the two-dimensional histogram embedding method in other schemes typically expands non-zero AC coefficients, pushing positive values further toward positive infinity and negative values toward negative infinity, leading to a substantial increase in compressed file size. The hexagonal tessellation matrix embedding method facilitates bidirectional coefficient modification, wherein positive values are adjusted toward negative infinity and negative values toward positive infinity, contingent upon the embedded secret data. This approach reduces the bit requirement during the encoding process, thereby effectively mitigating file size expansion.
Figure 9 display the FSI across three test images with different QF values and embedding payloads. Regardless of the test image, the amount of embedded data, or the compression quality, the proposed method consistently results in significantly smaller file size increments compared to the seven other methods. In some cases, the increase is as low as 39 bits, corresponding to only a 0.02% growth rate. The reason for achieving this low FSI is that the special hexagonal tessellation matrix embedding method ensures that each non-zero AC coefficient pair embeds three bits without unnecessary shifting modifications. When embedding a smaller amount of data, fewer non-zero AC coefficients are altered, preserving a larger proportion of unmodified coefficients. A smaller file size increment makes it more difficult for adversaries to infer the presence of hidden data based on a file size analysis.
Figure 9. File size increment (bits) comparison for our scheme and seven advanced JPEG RDH schemes [9,17,19,22,23,26,28].
By analyzing Table 1, Table 2 and Table 3, and Figure 9, we observe that for the test images Airplane and Splash, the FSI of the proposed method at the maximum embedding capacity is still lower than that of other methods that only embed a small amount of information. This suggests that, for similar file size increments, the proposed method enables a significantly higher embedding capacity.
We also conducted SSIM comparison experiments on the BOSSbase v1.01 dataset, with the results presented in Figure 10. The experiments were performed under two quality factor settings, QF = 50 and QF = 70, to evaluate the SSIM of stego images at varying embedding capacities. A higher SSIM value, closer to one, indicates greater similarity between the stego and original images. As shown in Figure 10, the proposed method exhibits the smallest SSIM decline as the payload increases. Although the average SSIM of the proposed method is not the highest at an embedding capacity of 4000 bits, it maintains a higher image similarity than other methods when embedding larger amounts of data. In contrast, other approaches show a significant drop in SSIM, leading to stego JPEG images that deviate more noticeably from their original counterparts.
Figure 10. SSIM comparison for two quality factors (QF = 50, 70) and different embedding capacities. Four SOTA JPEG DH schemes [9,22,23,29] and proposed scheme are tested on BOSSbase v1.01 image set.

5. Conclusions

This paper proposes a knowledge encapsulation method for JPEG images using a special hexagonal tessellation matrix. The proposed approach constructs a special hexagonal tessellation matrix that enables the utilization of all non-zero AC coefficient pairs for secret data embedding. The experimental results demonstrate that the method effectively balances a higher embedding capacity, good visual quality, and smaller file size expansion while preserving the JPEG format. We observed that the proposed scheme occasionally exhibits suboptimal PSNR values when embedding small data volumes. This limitation stems from our sequential embedding approach that does not selectively target specific DCT blocks. Consequently, our future research will focus on developing a smoothness algorithm for DCT blocks, prioritizing embedding in smoother blocks to minimize image distortion at lower embedding capacities.

Author Contributions

Conceptualization and methodology, H.C., C.-C.C. (Ching-Chun Chang), C.-C.C. (Chin-Chen Chang) and J.-C.L.; software, H.C.; validation, H.C. and C.-C.C. (Ching-Chun Chang); data curation, H.C.; writing—original draft preparation, H.C.; writing—review and editing, J.-C.L., H.C. and C.-C.C. (Chin-Chen Chang); supervision, C.-C.C. (Ching-Chun Chang) and C.-C.C. (Chin-Chen Chang). All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Dataset available on request from the authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chang, C.-C.; Echizen, I. Steganography in Game Actions. IEEE Access 2025, 13, 21029–21042. [Google Scholar] [CrossRef]
  2. Chang, C.-C.; Liu, Y.; Nguyen, T.S. A novel turtle shell based scheme for data hiding. In Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 27–29 August 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 89–93. [Google Scholar]
  3. Xie, X.-Z.; Lin, C.-C.; Chang, C.-C. Data Hiding Based on a Two-Layer Turtle Shell Matrix. Symmetry 2018, 10, 47. [Google Scholar] [CrossRef]
  4. Xie, X.-Z.; Chang, C.-C. Hiding data in dual images based on turtle shell matrix with high embedding capacity and re-versibility. Multimed. Tools Appl. 2021, 80, 36567–36584. [Google Scholar] [CrossRef]
  5. Liu, L.; Chang, C.-C.; Wang, A. Data hiding based on extended turtle shell matrix construction method. Multimed. Tools Appl. 2017, 76, 12233–12250. [Google Scholar] [CrossRef]
  6. Palani, A.; Loganathan, A. Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images. Expert Syst. Appl. 2024, 238, 121903. [Google Scholar] [CrossRef]
  7. Chang, C.-C. Reversible Linguistic Steganography with Bayesian Masked Language Modeling. IEEE Trans. Comput. Soc. Syst. 2023, 10, 714–723. [Google Scholar] [CrossRef]
  8. Chang, C.-C.; Wang, X.; Chen, S.; Echizen, I.; Sanchez, V.; Li, C.-T. Deep Learning for Predictive Analytics in Reversible Steganography. IEEE Access 2023, 11, 3494–3510. [Google Scholar] [CrossRef]
  9. Li, N.; Huang, F. Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion. Signal Process. 2020, 171, 107476. [Google Scholar]
  10. Fridrich, J.; Goljan, M.; Du, R. Lossless data embedding for all image formats. In Security and Watermarking of Multimedia Contents IV; SPIE: Washington, DC, USA, 2002; pp. 572–583. [Google Scholar] [CrossRef]
  11. Wang, K.; Lu, Z.M.; Hu, Y.J. A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 2013, 86, 1965–1975. [Google Scholar] [CrossRef]
  12. Hu, Y.; Wang, K.; Lu, Z.M. An improved VLC-based lossless data hiding scheme for JPEG images. J. Syst. Softw. 2013, 86, 2166–2173. [Google Scholar] [CrossRef]
  13. Fridrich, J.; Goljan, M.; Du, R. Invertible authentication watermark for JPEG images. In Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA, 2–4 April 2001; pp. 223–227. [Google Scholar]
  14. Chang, C.C.; Lin, C.C.; Tseng, C.S.; Tai, W.-L. Reversible hiding in DCT-based compressed images. Inf. Sci. 2007, 177, 2768–2786. [Google Scholar]
  15. Xuan, G.; Shi, Y.; Ni, Z.; Chai, P.; Cui, X.; Tong, X. Reversible data hiding for JPEG images based on histogram pairs. In Proceedings of the ICIAR 2007, Montreal, QC, Canada, 22–24 August 2007; pp. 715–727. [Google Scholar]
  16. Sakai, H.; Kuribayashi, M.; Morii, M. Adaptive reversible data hiding for JPEG images. In Proceedings of the 2008 International Symposium on Information Theory and Its Applications, Auckland, New Zealand, 7–10 December 2008; pp. 1–6. [Google Scholar]
  17. Huang, F.; Qu, X.; Kim, H.J.; Huang, J. Reversible data hiding in JPEG image. IEEE Trans. Circuits Syst. Video Technol. 2016, 26, 1610–1621. [Google Scholar]
  18. Wedaj, F.T.; Kim, S.; Kim, H.J. Improved reversible data hiding in JPEG images based on new coefficient selection strategy. EURASIP J. Image Video Process. 2017, 1, 63. [Google Scholar]
  19. Hou, D.; Wang, H.; Zhang, W.; Yu, N. Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 2018, 148, 41–47. [Google Scholar]
  20. He, J.; Chen, J.; Tang, S. Reversible data hiding in JPEG images based on negative influence models. IEEE Trans. Inf. Forensics Sec. 2020, 15, 2121–2133. [Google Scholar]
  21. He, J.H.; Pan, X.L.; Wu, H.T.; Tang, S.H. Improved block ordering and frequency selection for reversible data hiding in JPEG images. Signal Process. 2020, 175, 107647. [Google Scholar]
  22. Li, F.; Zhang, L.; Qin, C.; Wu, K. Reversible data hiding for jpeg images with minimum additive distortion. Inform. Sci. 2022, 585, 142–158. [Google Scholar]
  23. Li, F.; Qi, Z.; Zhang, X.; Qin, C. Progressive histogram modification for JPEG reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2024, 34, 1241–1254. [Google Scholar]
  24. Xiao, M.Y.; Li, X.L.; Ma, B.; Zhang, X.P.; Zhao, Y. Efficient reversible data hiding for JPEG images with multiple histograms modification. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 2535–2546. [Google Scholar]
  25. Xiao, M.Y.; Li, X.L.; Zhao, Y. Reversible data hiding for JPEG images based on multiple two-dimensional histograms. IEEE Signal Process. Lett. 2021, 28, 1620–1624. [Google Scholar]
  26. Yang, X.; Wu, T.Y.; Huang, F.J. Reversible data hiding in JPEG images based on coefficient-first selection. Signal Process. 2022, 200, 108639. [Google Scholar]
  27. Weng, S.W.; Zhou, Y.; Zhang, T.C.; Xiao, M.Y.; Zhao, Y. General framework to reversible data hiding for JPEG images with multiple two-dimensional histograms. IEEE Trans. Multimed. 2022, 25, 5747–5762. [Google Scholar] [CrossRef]
  28. Xiong, W.; Cao, C.; Wang, X.; Shao, Y.; Zhou, M. Reversible data hiding in JPEG images based on improved frequency selection and mapping strategy. Digit. Signal Process. 2025, 156, 104754. [Google Scholar] [CrossRef]
  29. Li, F.; Wang, Q.; Cheng, H.; Zhang, X.; Qin, C. JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification. IEEE Trans. Multimed. 2025, 1–15. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.