2022
DOI: 10.3390/sym14040819
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images

Abstract: A dual-image-based reversible data hiding (RDH) scheme can conceal secret data into a cover image by creating two steganographic images. These two stego-images can cooperate to extract secret data and restore the cover image. This paper describes a generalization of the orientation combination technology for dual-image-based RDH. We first propose a full search algorithm to find the optimal set of the reversible orientation combinations. Based on the algorithm, the modification range of pixel values can be dyna… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…The pixels of an image must be in the range of gray levels to avoid the scenarios of under-and overflow. The algorithms for restoring the cover image are described in Equations ( 14)- (17).…”
Section: Information Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…The pixels of an image must be in the range of gray levels to avoid the scenarios of under-and overflow. The algorithms for restoring the cover image are described in Equations ( 14)- (17).…”
Section: Information Extractionmentioning
confidence: 99%
“…The word "reversible" in this context indicates that one can remove the embedded data to restore the original image. In recent years, numerous principles of the reversible information hiding technology were proposed, such as the difference expansion method [3][4][5][6], histogram method [7][8][9][10][11], difference of the pixel value method [12][13][14], the least significant bit method (LSB) [15,16], dual-image-based schemes [17,18], other reversible information hiding schemes [19][20][21][22][23][24][25], and the predictionerror method [26][27][28][29][30][31][32]. A good information hiding theory provides a significant capacity for embedded secret data that cannot be detected [1,33,34].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, there is a need for a tradeoff between transparency and data-hiding capacity [3]. DHTs may also be classified as irreversible and reversible [24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43]. In irreversible DHTs, the distortions to the cover object are permanent, and one can't restore the original cover object after extracting the secret message.…”
Section: Introductionmentioning
confidence: 99%
“…The above-mentioned EMD-based algorithms are irreversible and numerically demanding. Due to the extraction function's cyclic nature, most EMD-based DHTs are irreversible, and one can find a few reversible EMD-based DHTs [24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43]. Reference [24] proposed the first reversible EMD-based DHT using two stego images.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation