Browse > Article
http://dx.doi.org/10.9717/kmms.2022.25.9.1291

Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity  

Kim, Pyung Han (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University)
Ryu, Kwan-Woo (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University)
Publication Information
Abstract
The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.
Keywords
Reversible Data Hiding; Dual Image; CFS; Secret Sharing; PSNR; Embedding Capacity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Bender, D. Gruhl, N. Morimoto, and Aiguo Lu, "Techniques for Data Hiding,"IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.   DOI
2 N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen,"Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
3 F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - A Survey, "Proceedings of the IEEE, Special Issue on P rotection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999.
4 X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction,"IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006.   DOI
5 A. Ker, "Improved Detection of LSB Steganography in Grayscale Images,"Proceeding of Information Hiding Workshop, Vol. 3200, pp. 97-115, 2004.
6 D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing,"Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.   DOI
7 Z. Ni, Y. Shi, N. Ansari, and W. Su, "Reversible Data Hiding,"IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.   DOI
8 X. Li, J. Li, B. Li, and B. Yang, "High-Fidelity Reversible Data Hiding Scheme based on Pixel-Value-Ordering and Prediction-Error Expansion,"Signal Processing, Vol. 93, pp. 198-205, 2013.   DOI
9 C. Chang, T. Kieu, and Y. Chou, "Reversible Data Hiding Scheme Using Two Steganographic Images,"Proceeding of IEEE Region 10 International Conference, pp. 1-4, 2007.
10 C. Qin, C. Chang, and T. Hsu, "Reversible Data Hiding Scheme based on Exploiting Modification Direction with Two Steganographic Images,"Multimedia Tools and Application, Vol. 74, No. 15, pp. 5861-5872, 2015.   DOI
11 T. Lu, J. Wu, and C. Huang, "Dual-ImageBased Reversible Data Hiding Method Using Center Folding Starategy,"Signal Processing, Vol. 115, pp. 195-213, 2015.   DOI
12 Y.J. Kim, P.H. Kim, and K.Y. Yoo, "A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing,"Journal of Korea Multimedia Society, Vol. 20, No. 2, pp. 261-270, 2017.   DOI
13 X.F. Chen and W.L. Guo, "Reversible Data Hiding Scheme Based on Fully Exploiting the Orientation Combinations of Dual Stego-Images,"International Journal of Network Security, Vol. 22, No. 1, pp. 126-135, 2019.
14 J.Y. Lin, Y. Chen, C.C. Chang, and Y.C. Hu, "Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Using Exploiting Modification Direction,"Multimedia Tools and Applications, Vol 78, pp. 25855-25872, 2019.   DOI
15 X. Chen and C. Hong, "An Efficient DualImage Reversible Data Hiding Scheme Based on Exploiting Modification Direction,"Journal of Information Security and Applications, Vol. 58, pp. 1-9, 2021.
16 A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.   DOI
17 B. Boehm, "StegExpose - A Tool for Detecting LSB Steganography," Computer Science, pp. 1-11, 2014
18 C. Lee, K. Wang, C. Chang, and Y. Huang, "A Reversible Data Hiding Scheme based on Dual Steganographic Images,"Proceeding of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228-237, 2009.