Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Similar documents
Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

Hybrid Non-Blind Color Image Watermarking

A Secured Method for Image Steganography Based On Pixel Values

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Parallelism for Nested Loops with Non-uniform and Flow Dependences

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

A Lossless Watermarking Scheme for Halftone Image Authentication

Load Balancing for Hex-Cell Interconnection Network

Data Hiding and Image Authentication for Color-Palette Images

A Binarization Algorithm specialized on Document Images and Photos

Enhanced Watermarking Technique for Color Images using Visual Cryptography

A Robust Webpage Information Hiding Method Based on the Slash of Tag

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Key-Selective Patchwork Method for Audio Watermarking

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

An Image Compression Algorithm based on Wavelet Transform and LZW

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Related-Mode Attacks on CTR Encryption Mode

High-Boost Mesh Filtering for 3-D Shape Enhancement

Local Quaternary Patterns and Feature Local Quaternary Patterns

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Cluster Analysis of Electrical Behavior

Reducing Frame Rate for Object Tracking

Shape-adaptive DCT and Its Application in Region-based Image Coding

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

An Image Fusion Approach Based on Segmentation Region

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

A NEW AUDIO WATERMARKING METHOD BASED

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Detecting MP3Stego using Calibrated Side Information Features

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

An Optimal Algorithm for Prufer Codes *

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Specifications in 2001

TN348: Openlab Module - Colocalization

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

A fast algorithm for color image segmentation

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Problem Set 3 Solutions

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

X- Chart Using ANOM Approach

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

Robust Shot Boundary Detection from Video Using Dynamic Texture

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Research and Application of Fingerprint Recognition Based on MATLAB

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Edge Detection in Noisy Images Using the Support Vector Machines

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Private Information Retrieval (PIR)

Fast Computation of Shortest Path for Visiting Segments in the Plane

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

Simulation Based Analysis of FAST TCP using OMNET++

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Classifier Selection Based on Data Complexity Measures *

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Available online at Available online at Advanced in Control Engineering and Information Science

MATHEMATICS FORM ONE SCHEME OF WORK 2004

Object-Based Techniques for Image Retrieval

Virtual Machine Migration based on Trust Measurement of Computer Node

Wishing you all a Total Quality New Year!

The Shortest Path of Touring Lines given in the Plane

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Parallel matrix-vector multiplication

A Computer Vision System for Automated Container Code Recognition

An Improved Image Segmentation Algorithm Based on the Otsu Method

An efficient method to build panoramic image mosaics

A Deflected Grid-based Algorithm for Clustering Analysis

Statistical Steganalyis of Images Using Open Source Software

A New Approach For the Ranking of Fuzzy Sets With Different Heights

Background Removal in Image indexing and Retrieval

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

Feature Reduction and Selection

UB at GeoCLEF Department of Geography Abstract

Audio Content Classification Method Research Based on Two-step Strategy

Video Proxy System for a Large-scale VOD System (DINA)

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Learning-Based Top-N Selection Query Evaluation over Relational Databases

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A Fusion Steganographic Algorithm Based on Faster R-CNN

Transcription:

Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department of Mathematcs, Natonal Changhua Unversty of Educaton, Changhua 50058, Tawan; lenghs@cc.ncue.edu.tw * Correspondence: tclu@cyut.edu.tw; Tel.: +886-4-333000 (ext. 4558) Receved: 9 September 07; Accepted: 9 October 07; Publshed: October 07 Abstract: The concept of a dual-mage based scheme n nformaton sharng conssts of concealng secret messages n two cover mages; only someone who has both stego-mages can extract the secret messages. In 05, Lu et al. proposed a center-foldng strategy where each secret symbol s folded nto the reduced dgt to reduce the dstorton of the stego-mage. Then, n 06, Lu et al. used a frequency-based encodng strategy to reduce the dstorton of the frequency of occurrence of the maxmum absolute value. Because the foldng strategy can obvously reduce the value, the proposed scheme ncludes the foldng operaton twce to further decrease the reduced dgt. We use a frequency-based encodng strategy to encode a secret message and then use the block foldng technque by performng the center-foldng operaton twce to embed secret messages. An ndcator s needed to dentfy the sequence number of the foldng operaton. The proposed scheme collects several ndcators to produce a combned code and hdes the code n a pxel to reduce the sze of the ndcators. The expermental results show that the proposed method can acheve hgher mage qualty under the same embeddng rate or hgher payload, whch s better than other methods. Keywords: dual stego-mages; nformaton hdng; center-foldng strategy; block foldng. Introducton Informaton hdng s a technque that conceals secret messages n dgtal meda. The sender embeds secret messages n a cover mage to generate a stego-mage and then sends t to the recever. The recever can extract the secret messages from the stego-mage (Fgure ). Fgure. Dagram of the nformaton hdng process. Symmetry 07, 9, 3; do:0.3390/sym9003 www.mdp.com/journal/symmetry

Symmetry 07, 9, 3 of 5 In general, nformaton hdng schemes can be classfed nto two categores,.e., reversble data hdng and rreversble data hdng, as shown n Fgure. The most commonly used rreversble data hdng methods nclude the least sgnfcant bt (LSB) substtuton method, the pxel-value dfferencng (PVD) method, and the explotng modfcaton drecton method (EMD) [ 4]. The LSB method s a well-known rreversble data hdng technque because of ts hgh payload and low dstorton. It drectly replaces the bts of the cover pxel wth secret bts for embeddng. Melkanen (006) proposes a modfcaton to the LSB method called LSB matchng []. In hs method, the secret bts are embedded by usng the bnary functon and four embeddng rules. Fgure. Informaton hdng categores. LSB: least sgnfcant bt substtuton method, PVD: the pxelvalue dfferencng method, EMD: the explotng modfcaton drecton method, DE: dfference expanson, HS: hstogram shftng, PVO: pxel-value orderng method. Wu and Tsa (003) proposed the PVD method []. In ther method, the dfference of two pxels n the cover mage s calculated to determne the number of bts to be embedded n these two pxels and a pre-defned range table. The technque can embed a large number of secret bts nto the cover mage wth hgh mperceptblty as t makes use of the characterstc of human vson senstvty. Chang and Tseng (004) utlzed the dfference of the predcted value and the target pxels to estmate the degree of smoothness or contrast of pxels to determne the number of bts to be embedded n the target pxels [3]. Zhang and Wang (006) proposed the EMD method [4]. The EMD method provdes a good mage qualty for the stego-mage wth a peak sgnal-to-nose rato (PSNR) of more than 5 db, snce, at most, only one pxel n each pxel group needs to be ncreased or decreased by one. Keu and Chang (0) mproved the EMD method by explotng eght modfcaton drectons to embed several secret bts nto a cover par at a tme [5]. Compared wth rreversble data hdng schemes, reversble data hdng schemes can recover the cover mage wthout any dstorton from the stego-mage after the secret messages have been extracted. The most commonly used reversble data hdng methods nclude the dfference expanson (DE) method, hstogram shftng (HS) method, and pxel-value orderng (PVO) method. Tan (003) proposed the DE method [6] that embeds a secret bt nto the LSB of the expanded dfference of each pxel par of the cover mage. The scheme provdes a hgh payload; however, the dstorton caused by the DE s sgnfcant. Alattar (004) mproved Tan s scheme wth double the respectve dfferences between four neghborng pxels and acheved more secret bts wth the expanded dfference [7]. N et al. (006) proposed the HS method n 006 [8]. Ther method s to frstly generate the hstogram by the pxel ntensty value and shft the bns between the zero and peak pont to create empty bns for data embeddng. The advantage of the HS method s ts low dstorton; however, ts drawback s a low payload, because the embeddng capacty s determned by the number of ponts

Symmetry 07, 9, 3 3 of 5 n the peak pont of the bn. L et al. and Gu et al. proposed an adaptve embeddng technque that dvdes pxels nto dfferent types to enhance the embeddng capacty of a predcton error [9,0]. L et al. (03) proposed the PVO method []. In ther method, for each block, the pxels are reordered nto a pxel vector, then the smallest pxel s predcted by the second smallest pxel, and the largest pxel s predcted by the second largest pxel. It uses predcton errors and to embed data, whereas predcton error 0 s unchanged. Peng et al. (04) mproved the PVO method to use larger blocks for embeddng and take better advantage of mage redundancy to yeld a hgher PSNR []. Qu and Km (05) modfed the PVO method so that each pxel s predcted usng ts sorted context pxels to acheve a better embeddng capacty n smooth mage regons [3]. Wang et al. (05) used a dynamc blockng strategy to dvde the cover mage adaptvely nto varous-szed blocks. Thus, the flat mage areas are preferentally dvded nto smaller blocks to retan a hgh embeddng capacty and the rough areas are dvded nto larger blocks to avod decreasng PSNR value [4]. The dual-mage-based hdng scheme s a new technology n the nformaton hdng feld. The concept of dual-mage, based on nformaton sharng, conssts of concealng secret messages n two of the same cover mages; only someone who has both stego-mages can extract the secret messages. A dagram of the dual-mage based hdng scheme s shown n Fgure 3. There are many advantages to usng dual-mage n data hdng, such as a hgh payload, reversblty, and strong robustness. (a) (b) Fgure 3. Dual-mage based hdng scheme. (a) Embed secret messages nto two of the same cover mages; (b) Extract secret messages from the two stego-mages. In the dual-mage-based hdng scheme, mage qualty and payload are affected by embeddng rules [5 ]. Chang et al. (007) combned the EMD method wth the dual-mage technque to

Symmetry 07, 9, 3 4 of 5 acheve a hgh payload and reduce dstorton [5]. Lee et al. (009) used combnatons of pxel orentaton locatons wth dual-mage to enhance embeddng capacty and preserve good vsual qualty [6]. Lee and Huang (03) converted secret messages nto qunary-based secret symbols and combned every two secret symbols as a set embedded n the dual-mage [7]. Chang et al. (03) converted secret messages nto decmal-based secret symbols, then embedded secret symbols n a rght dagonal lne [8]. Qn et al. (04) embedded secret messages n the frst mage usng the EMD method and n the second mage usng other rules that were dependent on the frst mage [9]. Lu et al. (05) used the LSB matchng method and modfed the non-reversble stego-pxels based on a rule table to restore the cover mage [0]. They proposed the center-foldng strategy to reduce the value of the secret symbols. Then, they embedded secret symbols n two stego-mages through an averagng method []. Lu et al. (06) proposed a frequency-based encodng method to reduce the dstorton derved by the maxmum secret dgt []. In [], Lu et al. propose a center-foldng strategy n whch each secret symbol s folded nto the reduced dgt before the embeddng procedure to reduce the dstorton of the stego-mage. The foldng strategy s smple and effectve, to the extent that the mage qualty of the stego-mage s very good. Because the foldng strategy can obvously reduce the value, the proposed scheme performs the foldng operaton twce to further decrease the reduced dgt. Furthermore, n [], Lu et al. use a frequency-based encodng strategy to reduce the dstorton of the frequency of occurrence of the maxmum absolute value. The re-encoded technque also can be used to reduce the number of the secret dgt and narrow down the dstance between the stegopxel and the orgnal pxel. Therefore, the proposed scheme frst uses a frequency-based encodng strategy to encode the secret message and then uses the block foldng technque by ncludng the center-foldng operaton twce to embed secret messages. In addton, several steganalyss technques are used to prove the strong robustness of the proposed scheme, ncludng hstogram steganalyss, Regular and sngular groups (RS) steganalyss [3], prmary sets, Ch square, sample pars RS analyss, and fuson detecton [4]. The rest of ths paper s organzed as follows. Secton descrbes related works. Secton 3 ntroduces the proposed scheme. Secton 4 summarzes the experment results. The conclusons are presented n Secton 5.. Related Works In ths secton, we brefly ntroduce Lee et al. s scheme, the center-foldng strategy, and the frequency-based encodng strategy... Lee et al. s Methods Lee et al. [6,7] proposed a drecton-based dual-mage method. In ther scheme, two pxels P and P are used to conceal four secret bts and a drecton map s used to represent the embeddng rules. Fgure 4 shows the drecton map. Suppose that two pxels are P = 5, P = 0 and the secret bts are 00. The drecton map ndcates that P = P + = 5 + = 6 and P = 0 for embeddng 00 n the frst stego-mage. If the next two secret bts are 0, then the stego-pxels are P = P = 5 and P = P + = 0 + = for the second stego-mage.

Symmetry 07, 9, 3 5 of 5 Fgure 4. Drecton-based embeddng rules. However, n some cases, the method cannot conceal secret data n the second stego-mage. Therefore, only the frst mage s modfed to embed the frst two secret bts. In 03, Lee and Huang mproved the above method by ncreasng the number of drecton rules from four drectons to fve drectons and redesgned the embeddng rule to ncrease the embeddng payload. The drecton map s shown n Fgure 5... Center-Foldng Strategy Fgure 5. Data embeddng method usng fve drectons. In [], Lu et al. proposed a center-foldng strategy where each secret symbol s folded nto the reduced dgt before the embeddng procedure to reduce the dstorton of the stego-mage. For example, K bts of secret data were taken as a set and converted nto the secret symbol d. The centerfoldng strategy changed the range of secret symbols from ={0,,,, } to = {, +,,,0,,,, }. The formula s as follows: d = d K, () where s a folded secret symbol and s an ntermedate value. After the foldng, the value range of the secret symbol changed to [, ]. Fgure 6 shows an example where s set to be 3. The maxmum value of the value range s 7. Assume that a pxel value s 38. If the secret symbol d = 7 s added drectly to the pxel to get the stego-pxel 38

Symmetry 07, 9, 3 6 of 5 + 7 = 45, then the mage dstorton nflcted s (45 38) =7 =49. However, n Lu et al. s scheme, the symbol s folded as = 7 = 3. The folded symbol =3 nstead of the orgnal symbol 7 s added wth the pxel 38 to get the stego-pxel 38 + 3 = 4. The mage dstorton caused by Lu et al. s method s (4 38) =3 =9. The mage dstorton s reduced from 49 to 9. Fgure 6. Example value range of the central-foldng strategy wth = 3. It s obvous that the center-foldng strategy s smple and effectve; t can reduce the dstorton of the stego-mage after the embeddng procedure. Therefore, n the proposed scheme, we perform the foldng operaton twce to further decrease the reduced dgt..3. Frequency-Based Encodng Strategy In [], Lu et al. used a frequency-based encodng strategy to reduce the dstorton of the frequency of occurrence of the maxmum absolute value. For example, suppose that the secret bt stream s 0 0 0 0 00 0. Frst, the scheme converts each three bts (K = 3) as a group to a decmal dgt stream as 7 3 7 3 5 6 7. Next, t uses the center-foldng strategy to reduce the dgt stream as 3 3 3. Then, the frequency table can be made as Table, whch records the rank of each reduced dgt and map number of ts new ndex n descendng order by occurrence frequency. Table. Example of the frequency-based encodng table (K = 3). Decmal Dgt Reduced Dgt Occurrence Frequency Order Indces 0 4 0 5 3 3 0 6 3 3 4 0 0 7 4 5 3 6 4 7 3 3 0 0 Compared wth embeddng the re-encoded secret dgt and the orgnal secret dgt, the frequency-based encodng strategy can be used to reduce the number of the secret dgt and narrow down the dstance between the orgnal pxel and the stego-pxel..4. Proposed Method In Lu s scheme, each secret symbol s reduced to the reduced dgt usng the center-foldng strategy. A dagram of Lu s center-foldng strategy s shown n Fgure 7. In the fgure, the center value 5 s subtracted from each decmal message to generate the reduced dgt. The value range of Fgure 7 can be seen as a band. The maxmum value of the band s 7 n Fgure 7. After the foldng, the band s separated nto two sub-bands. The maxmum absolute value of the two sub-bands s 4.

Symmetry 07, 9, 3 7 of 5 Fgure 7. Dagram of Lu s center-foldng strategy. Because the foldng strategy can obvously reduce the value, the proposed scheme ncludes the foldng operaton twce to further decrease the reduced dgt. The concept of the proposed scheme s shown n Fgure 8. In the fgure, the value range of s frst dvded nto two sub-bands SB and SB. Each sub-band performs a one-tme center-foldng strategy. For example, the value range of subband SB s shown n Fgure 8a. The center value of SB s. The center value s subtracted from the values n SB to generate the reduced dgt. We can see that the maxmum absolute value of the two sub-bands s, whch s smaller than the value 4 n Fgure 8. Fgure 8. Dagram of the proposed block foldng technque. However, the sub-bands SB and SB have the same reduced values. We cannot dstngush the orgnal value from. Hence, an ndcator s needed to dentfy whch sub-band the reduced value s located n. If the reduced value s located n the sub-band SB, then the ndcator s set to be 0, where =0. In contrast, f the reduced value s located n the sub-band SB, then the ndcator s set to be, where =. The orgnal value s mapped to a code par (, ) to reduce the mage dstorton. For example, the decmal value = 7 s mapped to the code par (, ) = (, ). However, the ndcator s extra nformaton that also needs to be concealed n the cover mage and wll decrease the hdng capacty. To solve ths problem, the proposed scheme collects several ndcators to produce a combned code and hdes the code n a pxel. In the proposed scheme, the cover mage s dvded nto several blocks. Each block has pxels n t. The last pxel n the block s used to embed the combned code. The other pxels are used to conceal the reduced dgt. Furthermore, the proposed scheme consders the occurrence frequency of the decmal dgt to reassgn proper code to the reduced dgt that can sgnfcantly shrnk the mage dstorton..5. Embeddng Procedure In the proposed scheme, a cover mage s dvded nto several blocks. Each block has pxels n t. Let = {,,, } be the block. A secret mage s formed as a bnary strng. The strng s separated nto several substrngs the sze of. Each substrng s transformed nto a decmal dgt. The scheme computes the occurrence frequency of each decmal dgt to generate a hstogram and sort the hstogram n descendng order. The dgt wth the maxmum frequency s I ', d ˆ'. encoded wth the smallest dstorton code par ( )

Symmetry 07, 9, 3 8 of 5 Each block can be used to hde ( ) code pars. The scheme conceals the reduced dgt n the pxel by usng an averagng method to generate the stego-pxels and, where. The ndcators are collected to form a combned code, and the code s concealed nto the last pxel of the block to generate and. Fgure 9 shows the nformaton hdng dagram of the proposed method. More detals of the procedures are gven below. Fgure 9. Informaton hdng dagram of the proposed scheme. Step : Transform a set of K secret bts nto a decmal dgt. Let d be the decmal dgt that s computed by d = where d [0, K ] and s j denotes the jth secret bt n the set. K j j s, () j= Step : Compute the occurrence frequency of each decmal dgt. Let F ( d ) be the occurrence frequency of each decmal dgt. These frequences are sorted n descendng order, and the ndex of sorted results s denoted as O ( d ). Step 3: Compute the reduced code d ˆ for each decmal dgt. In Fgure 6, the decmal dgt d has been folded twce to generate the reduced code dˆ and the ndcator I. Table shows the reduced codes and ndcators wth K = 3. The decmal dgts are reduced effectvely from [0, K ] to [ K, K ]. Table. Example code pars of Fgure 6 wth K = 3. d 0 3 4 5 6 7 I 0 0 0 0 dˆ 0 0 ( I, d ˆ ) (0, ) (0, ) (0, 0) (0, ) (, ) (, ) (, 0) (, ) However, the reduced dgts n Table do not show the feature of the secret mage. In Table, the absolutely reduced code d ˆ = s the maxmum reduced code, whch causes maxmum dstorton when drectly concealed nto the pxel. If the maxmum reduced code s occurrence

Symmetry 07, 9, 3 9 of 5 frequency s hgh, then drectly embeddng t n the mage wll decrease the vsual qualty. Hence, the proposed scheme further re-encodes the reduced code and ndcator code accordng to the order ˆ s computed by of O ( d ). The re-encoded code d where ˆ O( d) = sgn( O( d)), 4 d (3), ( v) =, f v s an odd number, sgn. (4) otherwse. Step 4: Compute the re-encoded ndcator I ' by 0, f O( d) = 0, I =, f mod( ( O( d) + ),4) = 0 or mod( O( d),4) = 0, (5) 0, otherwse. The above procedure re-encodes the reduced dgts and ndcators, whch occurs most frequently as the mnmum absolute value. The re-encoded code pars of Table are shown n Table 3. Table 3. The re-encoded code pars of Table. O ( d ) 0 3 4 5 6 7 I' 0 0 0 0 0 d ˆ 0 ( I',d' ˆ ) (0, 0) (0, ) (0, ) (, ) (, ) (0, ) (0, ) (, ) Step 5: Generate a mappng table for further embeddng and recovery processes. Integrate the reencoded code pars ( I ', d ˆ' ) wth the ndces d to form a mappng table. The mappng relatonshp must be recorded for use n the recovery phases. Table 4 shows an example mappng table wth K = 3. Table 4. Example mappng table wth K = 3. d F ( d) ( d) O I d ˆ ( I,dˆ ) 0 787,558 0 (0, ) 90,36 5 0 (0, ) 33,73 7 (, ) 3 90,853 3 (, ) 4 90,36 4 (, ) 5 34,03 6 0 (0, ) 6 90,853 0 (0, ) 7 879,3 0 0 0 (0, 0) Step 6: Step 7: Dvde a cover mage nto server blocks. Let = {,,, } be a block. Pck ( ) code pars,,,,,, to embed nto the block. () Conceal the re-encoded reduced dgt n the pxel by usng and BK = BK ˆd +, (6)

Symmetry 07, 9, 3 0 of 5 K = BK d ˆ B, (7) where, B K denotes the th pxel of the frst stego-block and B K denotes the th pxel of the second stego-block. Fgure 0 shows that the proposed ˆd method can control the dstorton wthn. () Collect the ndcators to form a combned code () = (,,, ). The combned code s computed by B = ID = (8) I (3) Embed the combned code n the pxel Step 8: BK = BK ID + B B, and (9) BK = BK ID Repeat Step 6 untl all blocks have been processed. B B (0) Fgure 0. Dagram of the averagng embeddng method. Fgure shows an example to llustrate the embeddng process. Fgure a s a secret strng wth 4 secret bts. Let K = 3, and the frst three secret bts 0 are transformed nto a decmal dgt 3 3 d = s = + + 0 = 6. The scheme maps the decmal dgt d to the = mappng table as shown n Table 4 to obtan the re-encoded code par, = (0, ). The transformaton of the other secret bts follows the same procedure descrbed above. Assume a cover mage s dvded nto several blocks szed B = 3. Each block can be used to hde ( ) = (3 ) = code pars. In Fgure a, the code pars are,,, = {(0, ), (,)}. Fgure 8b shows a cover mage. The frst block s = {05, 49,3 }. The reduced dgts = and = are concealed nto = 05 and = 49, respectvely. The stegopxels of the frst cover pxel = 05 are computed by B K = BK + = 05 + ( ) = 04 and B K = BK = 05 0 = 05. The stego-pxels of the second cover pxel = 49 are computed by B K = 49 + = 49 and B K = 49 = 48. Then, the scheme collects the ndcators to form a combned code = ( ) = (0) = (). The combned code s embedded n the pxel = 3 by B K 3 = BK3 + = 3 + 0 = 3 and B K 3 = BK3 = 3 = 3. Two stego-blocks are shown n Fgure b.

Symmetry 07, 9, 3 of 5 The embeddng procedure s executed repeatedly untl all code pars are embedded. The fnal stego-mages, along wth the mappng table, are sent to the recever for extracton and recovery. (a) (b) Fgure. Example of the proposed method. (a) Secret encodng; (b) Embeddng example..6. Overflow/Underflow Problem In the embeddng process, an underflow/overflow problem mght occur as a result of the reduced code. For example, f the pxel s BK = 54 and ˆd = 3, then the two together would cause the overflow problem. In the proposed scheme, the range of dˆ s [ K, K ]. If a pxel s larger than 55 ( K ) = 56 K, then the overflow problem mght occur because of the addton of K. If a pxel that s less than K, then t mght cause the underflow problem because of the addton of K. For example, assume K = 4, and the range of dˆ s [ 4, 3]. Suppose that dˆ = 3, and ˆd 3 = =. Then, the stego-pxel s BK ˆd BK = 0, =, and there s an underflow problem. Hence, the embeddable pxel s defned as beng n the range of K and 56 K. In the embeddng process, the proposed scheme determnes whether the pxel BK s n the range of [ K,

Symmetry 07, 9, 3 of 5 56 K ] or not. If the pxel s wthn the range, then t could be classfed nto a block. However, the pxel mght cause an underflow/overflow problem and the pxel s non-embeddable. For the nonembeddable pxel, the stego-pxels are set to equal the value of the orgnal pxels. For example, assume that K = 4 and a pxel n the range of [ 4, 56 4 ] = [4, 5] s embeddable. In Fgure, the pxel 54 s out of the range, whch means t s non-embeddable. The stego-pxels are set to equal ts orgnal pxel. The next pxels 3 and 05 are embeddable. However, the next pxel s nonembeddable and cannot be classfed nto a block. So, the next pxel 50 s gathered wth pxels 3 and 05 to form block BK ={3,05,50}, and the embeddng process s performed..7. Extracton and Recovery Fgure. Example of a block wth three embeddable pxels. In ths secton, we descrbe the extracton and recovery processes by whch re-encoded reduced dgts and secret bts are extracted from the stego-mage as well as the process of cover mage recovery. There are ( ) code pars concealed n an embeddable block. Hence, the recever dvdes the stego-mages nto several blocks the sze of B. The re-encoded reduced dgts dˆ can be extracted by computng the dfferences between two stego-pxels, where d ˆ = BK BK and. The combned code s extracted from the last pxels of the stego-blocks by ID = BK B BK. B Then, the recever transforms the combned code ID nto ( ) bnary bts. Each bt represents an ndcator I. One ndcator I along wth one re-encoded reduced dgt d ˆ forms the code par ( I, d ˆ ). After the code par s obtaned, t s then mapped to the mappng table to obtan the orgnal decmal dgt d. Each decmal dgt d s transformed nto K secret bts. In the recovery process, the cover pxel BK can be recovered by the average between two stegopxels,.e., BK + BK BK =. Fgure 3 shows the data extracton and recovery procedure of the proposed method. Fgure 3. Dagram of the extracton and recovery processes.

Symmetry 07, 9, 3 3 of 5 Followng the same example presented n Fgure b. The stego-blocks are = {04, 49, 3} and B K ={05,48,3}. The re-encoded reduced codes are d ˆ = BK BK = 04 05 = and d ˆ = BK BK = 49 48 =, and the combned code s ID = BK 3 BK 3 = 3 3=. The combned code s transformed nto (3 ) = bnary bts ID = ( 0), where I = 0 and I =. The code pars are ( I, d ˆ ) = (0, ) and ( I, d ˆ ) = (, ). The orgnal decmal dgts d = 6 and d = 3 can be derved by mappng them nto the mappng table as shown n Fgure a. Fnally, the decmal dgts d = 6 and d = 3 are transformed nto three secret bts,.e., 0 and 0. Furthermore, the orgnal pxel can be recovered by the average between B K and B K,.e., BK + BK 04 + 05 BK = = = 05, 49 + 48 BK = = 49, and 3 + 3 BK 3 = = 3. In the extracton process, the proposed scheme determnes whether the two stego-pxels are both outsde the range [ K, 56 ]. If so, then the pxels are non-embeddable. If the two stego-pxels are not equal and more than one pxel s wthn the range, then the pxels are embeddable and data are concealed wthn. The secret nformaton can be extracted, and the pxels can be restored followng the extracton procedure..8. Re-Encodng of the Combned Code In the embeddng process, the combned code s used to ndcate the number of sub-bands of the re-encoded code. The value range of ID s [0, () ]. For example, assume that the block sze s set to be = 5. The value range of ID s [0, () ] = [0, 5]. The maxmum value of the range s 5. The value s drectly added to the last pxel of the block to generate the stego-pxel. However, f the maxmum value occurrence frequency s hgh, then drectly embeddng t n the pxel wll decrease the vsual qualty. Therefore, the proposed scheme selectvely re-encodes the combned code accordng to ts occurrence frequency and generates a mappng table to record the relatonshp between the combned code and the re-encoded combned code. The re-encodng procedure s the same as the re-encodng procedure of the reduced code. 3. Results In the proposed scheme, the block sze B and the hdng bt K are key factors that nfluence the hdng performance. To fnd out proper values of B and K, eght schemes wth dfferent values are mplemented. They are BlockFoldng (B = 3, K = 3, RE = 0), BlockFoldng (B = 3, K = 3, RE = ), BlockFoldng (B = 3, K = 4, RE = 0), BlockFoldng (B = 3, K = 4, RE = ), BlockFoldng (B = 5, K = 3, RE = 0), BlockFoldng (B = 5, K = 3, RE = ), BlockFoldng (B = 5, K = 4, RE = 0), and BlockFoldng (B = 5, K = 4, RE = ). The parameters B and K are the block sze and the hdng bts, respectvely. The parameter RE ndcates whether the combned code s re-encoded or not. RE = 0 means the combned code s the orgnal value wthout re-encodng. In contrast, RE = means the combned code s re-encoded accordng to ts occurrence frequency. Fve related methods are also mplemented for a comparson wth the proposed schemes. These are Lee s dual steganographc scheme (Lee009), Lee s orentaton combnaton scheme (Lee03), Chang s magc matrx scheme (Chang03), Lu et al. s center-foldng scheme (Lu05), and Lu s scheme wthout the center-foldng strategy (NonFoldng). Two measurements are used to measure the performance of the hdng methods, the embeddng rate and the mage qualty. The embeddng rate R s calculated by C E R = (bpp), () h w

Symmetry 07, 9, 3 4 of 5 where C s the total hdng capacty of the two stego-mages, E s the sze of the mappng table, and h w s the sze of the mage. A hgh embeddng rate means that the proposed scheme has great embeddng ablty. Image qualty s calculated by usng the PSNR gven by PSNR_z = 0 log0 55 (db), MSE_z () where PSNR_z s the PSNR value of the zth stego-mage, db represents the decbels, and MSE_z s the mean squared error between the cover mage and the stego-mage, and s obtaned by MSE = (P P), hw (3) where P s the cover pxel and P s the stego-mage. The PSNR values n the expermental results are the average values of all PSNR_z, whch can be computed by PSNR_avg = PSNR_z (db). z (4) In general, t s very dffcult to determne the dfference between the cover mage and the stegomage by human eyes when the PSNR value s greater than 30 db. Sx grayscale mages were used to test the hdng performance. Fgure 4 shows the mages Lena, Mandrll, Arplane, Peppers, Lake, and Tffany. The sze of the mage s 5 5. Four secret mages, namely, random (5 5), Dolphn (375 35), Bran (40 35), and TffanySec (5 5) are shown n Fgure 5. (a) Lena (b) Mandrll (c) Arplane (d) Peppers (e) Lake (f) Tffany Fgure 4. Sx test mages.

Symmetry 07, 9, 3 5 of 5 (a) random (5 5) (b) Dolphn (75 35) (c) TffanySec (5 5) (d) Bran (40 35) Fgure 5. Four secret mages. In the frst experment, we tested the performance of the proposed scheme wth varous B, K, and RE. Fgure 6 shows the expermental results. BlockFoldng s the proposed scheme. Under the same embeddng rate, BlockFoldng (B = 3, K = 3, RE = 0) can acheve the hghest mage qualty. BlockFoldng (B = 5, K = 4, RE = ) can get the hghest hdng payload. When B = 3 and K = 3, the mage qualty wth RE = 0 s hgher than that wth RE =. However, when B = 5 and K = 4, the mage qualty wth RE = s hgher than that wth RE = 0. The reason s that f the block sze s small, then the combned code s small enough that t does not need to be re-encoded. However, for a block wth a large sze, the combned code s usually large enough that t needs to be re-encoded. For example, f the value range of the combned code wth B = 5 s [0, ( ) ] = [0, 5], the maxmum value 5 wll cause great mage dstorton. The re-encodng process can effectvely narrow down the dstorton.

Symmetry 07, 9, 3 6 of 5

Symmetry 07, 9, 3 7 of 5 Fgure 6. Results of the frst experment. To compare for a comparson of the proposed scheme wth other related methods, the value of B s set to 3 and 5, the value of K s set to 3 and 4, and RE s set to be 0 and. Tables 5 8 show the results of the comparson among the proposed scheme and the related works wth the cover mage Lena and the secret mages random, TffanySec, Dolphn, and Bran, respectvely. Table 5. Experment results for the secret mage random. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme 3 3 0 59.98 5.00 55.99 55,3.00 6.99 3 3 59.04 5.5 55.78 55,3.00 6.99 3 4 0 57.30 5.34 54.3 700,46.34 6.96 BlockFoldng 3 4 56.95 5.57 54.6 700,46.34 6.96 5 3 0 50.95 48.65 49.80 63,83. 4.65 5 3 58.3 5.5 54.64 63,83. 4.65 5 4 0 5.64 48.79 50. 843,776.6 4.80 5 4 56.8 50.65 53.46 843,776.6 4.80 Lu05 3 45.0 4.94 43.98 786,43.50.4 4 39.65 39.65 39.65,048,576.00.60 NonFoldng 3 4.69 39.35 40.5 786,43.50.4 Lee009 4 5.4 53.76 5.45 405,498 0.77.3 Lee03 4 50.97 5.9 5.63 54,88.00.5 Chang03 4 39.89 39.89 39.89 786,43.50.54 Table 6. Experment results for the secret mage Tffany. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme 3 3 0 55.37 49.79 5.58 55,3.00 7.0 3 3 53.5 50.8 5.6 55,3.00 7.0 3 4 0 50.6 47.79 49. 700,46.34 7.47 BlockFoldng 3 4 47.79 45.66 46.7 700,46.34 7.47 5 3 0 46.3 44.57 45.44 63,83. 4.89 5 3 5.55 48.88 50. 63,83. 4.89 5 4 0 43.84 4.69 43.6 843,776.6 4.99 5 4 49.48 47.50 48.49 843,776.6 4.99 Lu05 3 49.65 46.76 48.0 786,43.50.57 4 4.7 4.7 4.7,048,576.00.74 NonFoldng 3 4.93 39.80 40.87 786,43.50.57 Lee009 4 5.4 54.65 5.90 378,980 0.7.7 Lee03 4 50.69 49.39 50.04 54,88.00.8 Chang03 4 39.89 39.89 39.89 786,43.50.79

Symmetry 07, 9, 3 8 of 5 Table 7. Experment results for the secret mage Dolphn. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme 3 3 0 56.98 53.6 55.07 55,3.00 7.7 3 3 55.53 53.6 54.34 55,3.00 7.7 3 4 0 5.8 48.9 50.37 700,46.34 7.49 BlockFoldng 3 4 5.08 48.78 49.93 700,46.34 7.49 5 3 0 46.95 46.06 46.50 63,83. 5.0 5 3 53.56 5.7 5.36 63,83. 5.0 5 4 0 45.47 44.0 44.83 843,776.6 5.06 5 4 49.9 47.38 48.8 843,776.6 5.06 Lu05 3 47. 43.66 45.44 786,43.50.65 4 4.4 4.4 4.4,048,576.00.75 NonFoldng 3 40.64 38.30 39.47 786,43.50.65 Lee009 4 5.4 5.09 5.6 47,800 0.90.3 Lee03 4 49.0 50.86 49.98 54,88.00. Chang03 4 39.89 39.89 39.89 786,43.50.63 Table 8. Experment results for the secret mage Bran. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme 3 3 0 6.76 58.73 60.4 55,3.00 6.85 3 3 6.03 59.50 60.6 55,3.00 6.85 3 4 0 50.57 48.3 49.44 700,46.34 7.0 BlockFoldng 3 4 47.63 46.0 46.8 700,46.34 7.0 5 3 0 5.58 50.64 5. 63,83. 4.64 5 3 57.3 55.46 56.39 63,83. 4.64 5 4 0 43.89 4.89 43.39 843,776.6 4.88 5 4 48.38 46.90 47.64 843,776.6 4.88 Lu05 3 43. 4.9 43.0 786,43.50.59 4 36.95 36.95 36.95,048,576.00.99 NonFoldng 3 48.30 46.33 47.3 786,43.50.59 Lee009 4 5.4 63.70 57.4 76,696 0.53.6 Lee03 4 60.84 59.35 60.09 54,88.00.7 Chang03 4 39.87 39.87 39.87 786,43.50.55 In Table 5, wth the secret mage random, the PSNR_avg of the proposed scheme wth B = 5, K = 4, and RE = for the cover mage Lena s 53.46 db, whch s greater than the value of 43.98 db for Lu05. The mage qualty of the proposed scheme s hgher than the value of 9.48 db obtaned by Lu s scheme. At the same tme, the hdng rate of the proposed scheme s.6 bpp, whch s hgher than that of Lu05 s 0. bpp. Under the same hdng capacty, the mage qualty of the proposed scheme wth B = 3, K = 3, and RE = 0 s 55.99 db, whch s hgher than that of Lee03 s 5.63 db. Although Lu05 wth K = 4 acheves the hghest hdng rate,.0 bpp, the mage qualty of Lu05 s decreased to 39.65 db. In Table 6, although Lee009 has hghest mage qualty 5.90 db, the hdng rate of Lee009 s only 0.7 db. The results for dfferent secret mages have the same stuaton. In Table 8, for the secret mage Bran, the mage qualty obtaned by Lee009 s the hghest. However, ts hdng capacty s 0.53 bpp, whch s the lowest among all results obtaned by other methods. The proposed scheme wth B = 3, K = 3, and RE = 0 has the same hdng payloads as those of Lee03. The mage qualty of the proposed scheme s 58.73 db, whch s greater than that of the other methods, thereby ndcatng that the proposed scheme stll exhbts better embeddng performance compared wth the others. From the results of the experment, we can see that the proposed scheme wth a small block sze B = 3 acheves a hgher mage qualty. Because the combned code n the small block sze s small, the code does not need to be re-encoded where RE = 0. In contrast, the proposed scheme wth a large

Symmetry 07, 9, 3 9 of 5 block sze B = 5 has a hgher hdng capacty. The combned code n a large block sze needs to be reencoded, as the value of the code s usually very large. Hence, RE s set to be RE = for B = 5. The second experment compared the proposed scheme wth the other methods. Fgure 7 shows the comparson among all fve related methods and the proposed scheme n terms of embeddng rate and PSNR value. Fgure 7 shows that the mage qualty of BlockFoldng (B = 3, K = 3, RE = 0) s hgher than those of the other methods. Under the same embeddng rate, the proposed method can acheve a greater PSNR value than the related methods. The hdng capacty of BlockFoldng (B = 5, K = 4, RE = ) s hgher than those of the other methods.

Symmetry 07, 9, 3 0 of 5 Fgure 7. Comparson of the proposed and related methods. The thrd experment was amed at provng the vablty of the proposed scheme. Several steganalyss technques such as hstogram steganalyss, RS steganalyss, prmary sets, Ch square, sample pars, RS analyss, and fuson detecton were used to test the performance of the proposed scheme. The hstogram steganalyss method compares the shapes between the cover mage and the stego-mage to detect whether there s a concealed message. Fgure 8 shows hstogram comparsons of Lena wth dfferent parameters. The curve startng wth the symbol * s the hstogram of the stego-mage. We can see that the shape of the stego-mage s almost the same as that of the cover mage.

Symmetry 07, 9, 3 of 5 Fgure 8. Hstogram steganalyss of Lena wth dfferent parameters. RS steganalyss s a knd of attack method proposed by Frdrch et al. In the method, pxels are classfed nto several groups. The method uses a dscrmnaton functon to quantfy smoothness or regularty and uses a flppng functon to defne three groups, regular (R), sngular (S), and unusable

Symmetry 07, 9, 3 of 5 (U). The percentages of each group wth mask M = [ 0 0 ] and M = [ 0 0 ] are represented as R_M_G, R_FM_G, S_M_G, S_FM_G, U_M_G, and U_FM_G, respectvely. The hypotheses are R_M_G R_FM_G, S_M_G S_FM_G, and U_M_G U_FM_G. Fgure 9 shows the RS steganalyss results for Lena wth dfferent parameters. In the fgures, the curve of R_M_G s very smlar to that of R_FM_G. The method judges there s no secret message hdden n the mage. The curves of S_M_G, S_FM_G, U_M_G, and U_FM_G have the same stuatons. Hence, the proposed scheme cannot be detected by the RS steganalyss. Stego Stego Fgure 9. RS-dagram steganalyss of Lena wth the secret mage random.

Symmetry 07, 9, 3 3 of 5 Other tests ncludng prmary sets, Ch square, sample pars, RS analyss, and fuson detecton were appled to examne the proposed scheme. Table 9 shows the experment report. All numbers n the table are very small, whch means the proposed scheme s robust aganst the steganalytc attacks. Table 9. Steganalyss report for StegExpose. Cover B K Stego Prmary Sets Ch Square Sample Pars RS Analyss Fuson (Mean) 3 4 Stego 0.07675 0.00489 0.030703 0.0466 0.083 Stego 0.0305 0.005963 0.0986 0.07787 0.0880 Arplane 5 3 Stego 0.0934 0.004948 0.0735 0.0070 0.08088 Stego 0.0360 0.00569 0.0867 0.07553 0.03763 5 4 Stego 0.0964 0.005567 0.087 0.06658 0.0666 Stego 0.04443 0.004844 0.0066 0.05573 0.068 3 4 Stego 0.050697 0.000000 0.004456 0.07477 0.00658 Stego 0.03 0.00009 0.05046 0.04435 0.0505 Lake 5 3 Stego 0.0449 0.000000 0.0996 0.08785 0.0305 Stego 0.04343 0.000003 0.033 0.0538 0.0470 5 4 Stego 0.043350 0.000000 0.059 0.0905 0.0939 Stego 0.03905 0.000003 0.07985 0.0308 0.058 3 4 Stego 0.005693 0.0096 0.0993 0.005686 0.007967 Stego 0.04598 0.0067 0.060 0.00666 0.00963 Lena 5 3 Stego 0.009356 0.007 0.050 0.0088 0.009004 Stego 0.03644 0.0003 0.08364 0.03555 0.0986 5 4 Stego 0.00998 0.0075 0.040 0.00706 0.005673 Stego 0.0955 0.00 0.0369 0.00865 0.00068 3 4 Stego 0.054084 0.00449 0.09357 0.085073 0.0584 Stego 0.046409 0.00583 0.08333 0.08457 0.059895 Mandrll 5 3 Stego 0.07036 0.00079 0.587 0.5084 0.07856 Stego 0.07760 0.0046 0.070 0.09950 0.0759 5 4 Stego 0.075838 0.0045 0.3048 0.09635 0.074096 Stego 0.053453 0.0049 0.090763 0.08700 0.0584 3 4 Stego 0.080749 0.00956 0.05594 0.06084 0.0507 Stego 0.05870 0.0097 0.05464 0.0796 0.04657 Pepper 5 3 Stego 0.048 0.00355 0.076068 0.063953 0.06797 Stego 0.04876 0.004 0.07476 0.059740 0.08558 5 4 Stego 0.09348 0.0035 0.06543 0.05487 0.0545 Stego 0.08306 0.00894 0.057448 0.063565 0.05734 3 4 Stego 0.04587 0.00567 0.04456 0.046080 0.035357 Stego 0.038765 0.005464 0.04339 0.0400 0.03868 Tffany 5 3 Stego 0.0368 0.005454 0.03673 0.040666 0.0995 Stego 0.0080 0.00570 0.0787 0.03347 0.0076 5 4 Stego 0.04459 0.00590 0.043003 0.04746 0.033799 Stego 0.047008 0.00560 0.04099 0.0337 0.0305 4. Conclusons The dual-mage-based hdng scheme s a new technology n the data hdng feld. The concept of dual-mage, based on nformaton sharng, conssts of concealng secret messages n two of the same cover mages; only someone who has both stego-mages can extract the secret messages. There are many advantages to usng dual-mage n data hdng, such as ts hgh payload, reversblty, and strong robustness. The proposed method mproves Lu s center-foldng strategy by ncludng the foldng operaton twce and usng an ndcator to dentfy the second foldng operaton as a means of dstngushng dfferent sub-bands to further decrease the reduced dgt. In addton, the proposed method effectvely solves the overflow/underflow problem. In order to evaluate the performance of the proposed scheme, eght schemes wth dfferent B and K values were mplemented. Moreover, fve related methods were mplemented for a comparson wth the proposed scheme. The frst experment showed that a small B value acheves hgher mage qualty, a large K value acheves a large payload, and the re-encodng process can effectvely narrow down the dstorton when B s larger. The second experment compared the

Symmetry 07, 9, 3 4 of 5 proposed and related methods. The results showed that the proposed scheme can acheve hgher mage qualty (B = 3, K = 3, RE = 0), better mage qualty under the same embeddng rate, and a hgher payload than other schemes (B = 5, K = 4, RE = ). The thrd experment used several steganalyss technques to prove the strong robustness of the proposed scheme, nclude hstogram steganalyss, RS steganalyss, prmary sets, Ch square, sample pars RS analyss, and fuson detecton. Acknowledgments: Ths study was fnancally supported by a research grant from Tawan s Mnstry of Scence and Technology (MOST 05--E- 34-00). Author Contrbutons: Tzu-Chuen Lu desgned the algorthm, conducted all experments, analyzed the results, wrote the manuscrpt, and conducted the lterature revew. Hu-Shh Leng conceved the algorthm and wrote the manuscrpt. Conflcts of Interest: The authors declare no conflct of nterest. References. Melkanen, J. LSB matchng revsted. IEEE Sgnal Process. Lett. 006, 3, 85 87.. Wu, D.-C.; Tsa, W.-H. A steganographc method for mages by pxel-value dfferencng. Pattern Recognt. Lett. 003, 4, 63 66. 3. Chang, C.C.; Tseng, H.W. A steganographc method for dgtal mages usng sde match. Pattern Recognt. Lett. 004, 5, 43 437. 4. Zhang, X.; Wang, S. Effcent steganographc embeddng by explotng modfcaton drecton. IEEE Commun. Lett. 006, 0, 78 783. 5. Keu, T.D.; Chang, C.C. A steganographc scheme by fully explotng modfcaton drectons. Expert Syst. Appl. 0, 38, 0648 0657. 6. N, Z.; Sh, Y.Q.; Ansar, N.; Su, W. Reversble data hdng. IEEE Trans. Crcuts Syst. Vdeo Technol. 006, 6, 354 36. 7. Alattar, A. Reversble watermarks usng a dfference expanson. In Internet and Communcatons Multmeda Securty Handbook; Furht, B, Krovsk, D, Eds.; CRC Press: Boca Raton, FL, USA; 004. 8. Tan, J. Reversble data embeddng usng a dfference expanson. IEEE Trans. Crcuts Syst. Vdeo Technol. 003, 3, 890 896. 9. L, X.; Yang, B.; Zeng, T. Effcent reversble watermarkng based on adaptve predcton-error expanson and pxel selecton. IEEE Trans. Image Process. 0, 0, 354 3533. 0. Gu, X.; L, X.; Yang, B. A hgh capacty reversble data hdng scheme based on generalzed predctonerror expanson and adaptve embeddng. Sgnal Process. 04, 98, 370 380.. L, X.; L, J.; L, B.; Yang, B. Hgh-fdelty reversble data hdng scheme based on pxel-value-orderng and predcton-error expanson. Sgnal Process. 03, 93, 98 05.. Peng, F.; L, X.; Yang, B. Improved PVO-based reversble data hdng. Dgt. Sgnal Process. 04, 5, 55 65. 3. Qu, X.; Km, H.J. Pxel-based pxel value orderng predctor for hgh-fdelty reversble data hdng. Sgnal Process. 05,, 49 60. 4. Wang, X.; Dng, J.; Pe, Q. A novel reversble mage data hdng scheme based on pxel value orderng and dynamc pxel block partton. Inf. Sc. 05, 30, 6 35. 5. Chang, C.C.; Keu, T.D.; Chou, Y.C. Reversble data hdng scheme usng two steganographc mages. In Proceedngs of the 007 IEEE Regon 0 Internatonal Conference (TENCON), Tape, Tawan, 30 Ocotber November 007; pp. 4. 6. Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A reversble data hdng scheme based on dual steganographc mages. In Proceedngs of the 3rd Internatonal Conference on Ubqutous Informaton Management and Communcaton (ICUIMC 09), Suwon, Korea, 5 6 January 009; pp. 8 37. 7. Lee, C.F.; Huang, Y.L. Reversble data hdng scheme based on dual stegano-mages usng orentaton combnatons. Telecommun. Syst. 03, 5, 37 47. 8. Chang, C.C.; Lu, T.C.; Horng, G.; Huang, Y.H.; Hsu, Y.M. A hgh payload data embeddng scheme usng dual stego-mages wth reversblty. In Proceedngs of the 03 9th Internatonal Conference on Informaton, Communcatons and Sgnal Processng, Tanan, Tawan, 0 3 December 03; pp. 5.

Symmetry 07, 9, 3 5 of 5 9. Qn, C.; Chang, C.C.; Hsu, T.J. Reversble data hdng scheme based on explotng modfcaton drecton wth two steganographc mages. Multmed. Tools Appl. 04, 74, 586 587. 0. Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual magng-based reversble hdng technque usng LSB matchng. Sgnal Process. 05, 08, 77 89.. Lu, T.C.; Wu, J.H.; Huang, C.C. Dual-mage-based reversble data hdng method usng center foldng strategy. Sgnal Process. 05, 5, 95 3.. Lu, T.C.; Ch, L.P.; Wu, C.H.; Chang, H.P. Reversble data hdng n dual stego-mages usng frequencybased encodng strategy. Multmed. Tools Appl. 06, do:0.007/s04-06-435-. 3. Frdrch, J.; Goljan, M.; Du, R. Relable detecton of LSB steganography n grayscale and color mages. In Proceedngs of the 00 Workshop on Multmeda and Securty, Ottawa, ON, Canada, 5 October 00; pp. 7 30. 4. Boehm, B. StegExpose A Steganalyss Tool for Detectng LSB Steganography n Images. Avalable onlne: http://arxv.org/abs/40.6656 (accessed on 9 September 07). 07 by the authors. Lcensee MDPI, Basel, Swtzerland. Ths artcle s an open access artcle dstrbuted under the terms and condtons of the Creatve Commons Attrbuton (CC BY) lcense (http://creatvecommons.org/lcenses/by/4.0/).