The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual Stego-Images

Reversible steganography with two stego-image deals with the embedding of secret data on another image that produce two stego-images in such a way that during extraction the initial cover image can be recovered. This research work proposes an algorithm capable of reversible hiding of data, which produce two stego-images based on bidirectional circular shifting i.e., shifting in clockwise and anti-clockwise direction. Initially, the approach involves categorizing the information into L bits and transforming it into a corresponding decimal representation. The two adjacent decimal number forms a pair such that the first decimal number is shifted in both clockwise and anticlockwise direction to produce clockwise value and anticlockwise value. From the clockwise value, anticlockwise value and secret decimal data a single minimum value is chosen with an index from which the minimum value is transformed on the basis of the minimum value’s histogram. The modified transformed values and indices are incorporated into pairs of cover image pixels to generate the stego-images. During the extraction process, adjusted transformed value and index are extracted from which the hidden data is reconstructed by finding the number of clockwise and anticlockwise shifts. Experimental evaluation shows higher Peak Signal-To-Noise Ratio (PSNR) than the conventional methods.

[1] AbdAl-Hameed S., Abdullah H., Khalf N., and Alghazo J., “An Enhanced Steganography Approach for Concealing Audio in Images Using Double Density-Dual Tree Wavelet Transform,” Revue d’Intelligence Artificielle, vol. 37, no. 5, pp. 1237-1244, 2023. https://doi.org/10.18280/ria.370516

[2] Abd-El-Atty B., “A Robust Medical Image Steganography Approach Based on Particle Swarm Optimization Algorithm and Quantum Walks,” Neural Computing and Applications, vol. 35, no. 1, pp. 773-785, 2023. https://doi.org/10.1007/s00521-022-07830-0

[3] Cao X., Du L., Wei X., Meng D., and Guo X., “High-Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation,” IEEE Transactions on Cybernetics, vol. 46, no. 5, pp. 1132-1143, 2015. DOI:10.1109/TCYB.2015.2423678

[4] Chang C., Kieu T., and Chou Y., “Reversible Data Hiding Scheme Using Two Steganographic Images,” in Proceedings of the 10th IEEE Region Conference, Taipei, pp. 1-4, 2007. https://ieeexplore.ieee.org/document/4483783

[5] Chang C., Lu T., Horng G., Huang Y., and Hsu Y., “A High Payload Data Embedding Scheme Using Dual Stego-Images with Reversibility,” in Proceedings of the 9th International Conference on Information, Communications and Signal Processing, Tainan, pp. 1-5, 2013. DOI:10.1109/ICICS.2013.6782790

[6] Chhajed G., Deshmukh K., and Kulkarni T., “Review on Binary Image Steganography and Watermarking,” International Journal on Computer Science and Engineering, vol. 3, no. 11, pp. 3645, 2011. https://www.researchgate.net/publication/285812 082

[7] Dong L., Zhou J., Tang Y., and Liu X., “Estimation of Capacity Parameters for Dynamic Histogram Shifting (DHS)-based Reversible Image Watermarking,” in Proceedings of the IEEE International Conference on Multimedia and Expo, Chengdu, pp. 1-6, 2014. DOI:10.1109/ICME.2014.6890276

[8] Dragoi I. and Coltuc D., “Local-Prediction-based Difference Expansion Reversible Watermarking,” IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1779-1790, 2014. DOI:10.1109/TIP.2014.2307482

[9] Fridrich J. and Kodovsky J., “Rich Models for Steganalysis of Digital Images,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, 2012. DOI:10.1109/TIFS.2012.2190402

[10] Goljan M., Fridrich J., and Cogranne R., “Rich Model for Steganalysis of Color Images,” in Proceedings of the IEEE International Workshop on Information Forensics and Security, Atlanta, pp. 185-190, 2014. DOI:10.1109/WIFS.2014.7084325

[11] Hong W., Chen T., and Shiu C., “Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors,” Journal of Systems and Software, vol. 82, no. 11, pp. 1833- 1842, 2009. https://doi.org/10.1016/j.jss.2009.05.051

[12] Image Processing Place, Image Databases, Test Cover Images, https://www.imageprocessingplace.com/root_file s_V3/image_databases.htm, http://www.imageprocessingplace.com/download s_V3/root_downloads/image_databases/standard _test_images.zip, Last Visited, 2024.

[13] Image Repository-University of Waterloo, Test Secret Images, http://links.uwaterloo.ca/Repository.html, Last Visited, 2024.

[14] Jung K., “Authenticable Reversible Data Hiding Scheme with Less Distortion in Dual Stego- Images,” Multimedia Tools and Applications, vol. 77, pp. 6225-6241, 2018. https://doi.org/10.1007/s11042-017-4533-0

[15] Li X., Zhang W., Gui X., and Yang B., “Efficient Reversible Data Hiding based on Multiple Histograms Modification,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 2016-2027, 2015. DOI:10.1109/TIFS.2015.2444354

[16] Lu T., Tseng C., and Wu J., “Dual Imaging-based Reversible Hiding Technique Using LSB Matching,” Signal Processing, vol. 108, pp. 77- 89, 2015. https://doi.org/10.1016/j.sigpro.2014.08.022

[17] Ma B., Li K., Xu J., Wang C., and Li X., “A High- Performance Image Steganography Scheme Based on Dual-Adversarial Networks,” IEEE Signal Processing Letters, vol. 31, pp. 2655-2659, 2024. DOI:10.1109/LSP.2024.3440176

[18] Mei Q., Wong E., and Memon N., “Data Hiding in Binary Text Documents,” in Proceedings of the International Society for Optical Engineering, San Bidirectional Circular Shift-Based Reversible Steganography Algorithm with Dual ... 721 Jose, pp. 369-375, 2001. DOI:10.1117/12.435420

[19] Qin C., Chang C., and Hsu T., “Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images,” Multimedia Tools and Applications, vol. 74, pp. 5861-5872, 2015. https://doi.org/10.1007/s11042- 014-1894-5

[20] Shaji C. and Sam I., “Dual Encoding Approach with Sequence Folding for Reversible Data Hiding in Dual Stego Images,” Multimedia Tools and Applications, vol. 80, no. 9, pp. 13595-13614, 2021. https://doi.org/10.1007/s00521-022-07830- 0

[21] Shi Y., Sutthiwan P., and Chen L., “Textural Features for Steganalysis,” in Proceedings of the 14th International Conference on Information Hiding, Berkeley, pp. 63-77, 2012. https://doi.org/10.1007/978-3-642-36373-3_5

[22] Thanasekaran V. and Selvaraj A., “Low Dimensional Multi Class Steganalysis of Spatial LSB Based Stego Images Using Textural Features,” The International Arab Journal of Information Technology, vol. 21, no. 2, pp. 233- 242, 2024. https://doi.org/10.34028/iajit/21/2/6

[23] Tseng Y., Chen Y., and Pan H., “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1227-1231, 2002. DOI:10.1109/TCOMM.2002.801488

[24] Wang C., Li X., and Yang B., “Efficient Reversible Image Watermarking by Using Dynamical Prediction-Error Expansion,” in IEEE International Conference on Image Processing, Hong Kong, pp. 3673-3676, 2010. DOI:10.1109/ICIP.2010.5652508

[25] Wang Y., Shen J., and Hwang M., “A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching,” International Journal of Network Security, vol. 20, no. 4, pp. 801-804, 2018. http://ijns.jalaxy.com.tw/contents/ijns-v20- n4/ijns-2018-v20-n4-p801-804.pdf

[26] Wu M. and Liu B., “Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, vol. 6, no. 4, pp. 528- 538, 2004. DOI:10.1109/TMM.2004.830814

[27] Wu X. and Sun W., “High-Capacity Reversible Data Hiding in Encrypted Images by Prediction Error,” Signal Processing, vol. 104, pp. 387-400, 2014. https://doi.org/10.1016/j.sigpro.2014.04.032

[28] Zhang X. and Wang S., “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006. DOI:10.1109/LCOMM.2006.060863