1. Introduction
Due to the rapid progress of digital processing technology and the booming of social media platforms, the amount of multimedia information transmitted over the Internet in our daily life is exponentially increasing. However, the public property of the Internet makes it a challenge for intellectual property rights because both authorized and unauthorized users can access the transmitted message. Moreover, unauthorized users may not only eavesdrop but also tamper and duplicate the transmitted data. To protect the confidentiality of the transmitted data, conventional cryptographic techniques [
1], such as RSA, DES, AES, and so on, are mainly used. In general, cryptographic algorithms consist of two parts: encryption and decryption. Encryption is a procedure of converting plaintext into incomprehensible machine code known as ciphertext. In contrast, decryption is the procedure of restoring meaningless data into meaningful data. Once the sensitive data has been encrypted in advance, the confidentiality of the transmitted data is guaranteed. Unfortunately, the meaningless format becomes another clue to attract the malicious attackers. Data hiding is another approach to imperceptibly conceal secret data in cover media, such as audio, video, image, and text, etc., without drawing malicious users’ attention. After the hiding procedure, the cover media are transformed into stego media, and they can be transmitted through the Internet because the difference between the cover media and stego image is slightly tinny and it is hard for attackers to tell the difference. No matter how tinny distortion is caused during the hiding procedure, in conventional data hiding schemes, the original cover media cannot be completely restored and the possible applications are limited.
To support more applications’ scenarios, such as applications of satellite images, military, and medical image processing, reversible data hiding (RDH), which is one sub-category of data hiding techniques, becomes an impressive technique because it guarantees an original cover image can be completely restored once the hidden secret data are extracted from the stego image. In 2003, Tian first proposed difference expansion (DE)-based RDH [
2] by concealing secrets into the original difference value between the pair of neighboring pixels. Three years later, Ni et al. designed the first histogram shifting (HS)-based RDH scheme [
3] by finding the peak points and zero points and adopting pixel shifting operation. Inspired by the research teams of Tian [
2] and Ni et al. [
3], many DE-based and HS-based RDH schemes have been proposed in the last decade. In general, a single image was adopted as cover media to carry secret data until Chang et al. introduced a dual-image-based RDH approach [
4] in 2007.
In the dual-image-based RDH approach, two stego images are involved to carry the secret data. The ordinary phases of a data hiding scheme, data hiding and data extraction, are changed to share construction and secret extraction/restoration phases in a dual-image-based RDH scheme. In other words, two stego images may share the same or different source(s) of the cover image(s) to carry the secret data in a dual-image-based RDH scheme. Because the secret data are embedded separately in two stego images, the likelihood of malicious users successfully extracting the hidden information is reduced compared to traditional reversible data hiding methods. However, the requirements for the extraction process in a dual-image-based RDH scheme are quite stringent. The successful extraction of the hidden data depends on having both stego images. Thus, if a secret owner uses this method and distributes the two stego images to different participants, those participants must work together to extract the hidden information.
In Chang et al.’s scheme [
4], they first transform binary secret data into quinary digits, and then, a transformed quinary digit is concealed by a pixel pair at a time by distributing them into two corresponding stego images. Next, Zhang and Wang’s exploiting modification direction (EMD) matrix [
5] was adopted to conceal two quinary digits into a cover pixel pair and derived two stego images finally. During the share construction phase, the main diagonal and the secondary diagonal directions of the EMD matrix were referred to. Eventually, they approximately provided an embedding rate (ER) of 1 bit per pixel (bpp) and acceptable visual quality of stego images. In 2013, Lee and Huang [
6] also worked with quinary digits but using combinations of pixel orientations located at two stego images. Their hiding strategy kept the difference between each pixel value of the stego image and the cover image plus or minus one, which also improves their ER as 1.07 bpp and PSNR as 49.6 dB.
Except the EMD matrix [
5], various matrices have been designed to either enhance the security of the hidden data or improve the hiding capacity. Two representative matrices are the Sudoku matrix [
7] and turtle shell (TS) reference matrix [
8]. In 2008, Chang et al. [
7] first applied the Sudoku matrix to design a dual-image-based RDH scheme. In their scheme, secret data were first transformed into novenary digits considering a Sudoku matrix can be divided into 3 × 3 non-overlapping blocks. Because each cover pixel pair carried a novenary digit, in average, their ER was about 1.5 bpp, while the PNSR only remained 44 dB. It is noted that, with the structure feature of the Sudoku matrix, the amount of possible solutions of a Sudoku matrix is vast so that the security of the hidden data was achieved. In 2018, Liu and Chang [
8] first applied a TS reference matrix to design their dual-image-based RDH. In their scheme, two cover pixels formed a pair and decided on a coordinate in the TS reference matrix. Then, four categories were defined based on which position of TS the coordinate maps to. They also designed a dynamic data hiding based on different categories and made sure the coordinate formed by the stego pixel pair remained at a certain region. Therefore, the main advantage of their scheme is that both the reversibility and authentication capability can be achieved simultaneously, but their ER is only around 1 bpp. Different from previous research teams, Huynh et al. [
9] focused on enlarging the payload size. In their scheme, they first converted each pixel of the grayscale secret image into novenary digits. Then, they concealed a novenary digit into a cover pixel pair and derived two stego images. They successfully increased the ER to 2 bpp at a cost of image quality of about 36 dB, which is relatively lower than those of existing schemes.
In 2022, Lin et al. [
10] proposed a novel dual-image-based RDH using TS reference matrix. In general, their idea was inspired by Liu and Chang [
11], and they sought to make progress on the authentication capability and visual quality of stego images. To achieve the authentication ability, they also defined a predetermined region in advance and made sure the stego pixel pair remained in this region so that, during the extraction and verification phases, the receivers could judge whether the pixel pairs of stego images were tampered with. They reshaped the region to provide the authentication mechanism while reducing the potential distortion during the share construction phase. With the authentication mechanism, the average PSNR was about 48 dB, while the highest ER remained 1 bpp and the average detection ratio (DR) was about 97%. The results showed that 97% of the tampered area can be successfully identified with their scheme. In the same year, Chang et al. [
12] proposed a position-aware guided dual-image-based RDH scheme that combines the concepts of TS and sunflower region to enhance the adaptability of data embedding. The average PSNR of this scheme is approximately 46.98 dB, with a maximum embedding rate of 1.25 bpp.
Later, Lin et al. [
13] proposed a dual-image-based RDH scheme based on asymmetric orientation combination. They fully utilized the directional differences between different images by adjusting the orientation combinations of pixels within the images to achieve effective data embedding while ensuring a high embedding capacity and visual quality. Their approach significantly enhances the security and stability of data hiding. Under the condition of maximum embedding capacity with a certification mechanism, their scheme maintains an average PSNR of approximately 41.79 dB, a maximum embedding rate of 1.82 bpp, and an average detection rate of about 91%. Solak et al. [
14] applied the most significant bit (MSB) and center shifting techniques to design their dual-image-based RDH scheme. Their scheme offered the maximum embedding capacity up to 2.96 bpp at the cost of the average PSNR remaining at about 28.36 dB, although the reversibility of the hidden secret data and the original cover image were guaranteed.
In 2024, Kim et al. [
15] introduced an improved dual-image-based RDH scheme that integrates embedding direction adjustment (EMD) technology with an optimized least significant bit (LSB) replacement strategy. This approach achieved an average PSNR of 50.74 dB and a maximum embedding rate of about 1.1 bpp. Lee et al. [
16] developed a dual-image RDH approach based on vector coordinates and triangle order coding (TOC). Their scheme achieved an average PSNR of 34.78 dB at high embedding rates, with a maximum embedding capacity of up to 2.5 bpp. Subsequently, Liu et al. [
17] designed a novel dual-image RDH method using matrix coding with an average PSNR of 36.36 dB and a maximum embedding rate of 1.5 bpp.
Although dual-image-based RDH schemes have achieved notable improvements in either hiding capacity or image quality, the openness of the Internet makes the transmitted stego images vulnerable to tampering by malicious attackers. In these schemes, if one of the stego images is altered, it must be resent to retrieve the hidden secret data, which is particularly critical in application fields like healthcare or the military, where data integrity and usability are essential requirements. To improve the usability of received stego images and facilitate smooth data extraction, it is essential to detect any malicious modifications that may have occurred.
However, despite the significance of authenticable capability, this requirement has not been thoroughly examined, as evidenced by the summary of characteristics for seven representative dual-image-based RDH schemes [
6,
8,
9,
10,
11,
13,
15] presented in
Table 1. Moreover, the data in
Table 1 indicate that improving the authenticable capability often affects either the image quality of the stego images or the hiding capacity. To address this challenge, this study incorporates verification codes during the data embedding process and introduces an additional verification algorithm to help the receiver detect any tampering of stego images during transmission. This approach enhances both the security of network transmission and the usability of the received stego images. The proposed verification mechanism allows the receiver to confirm the accuracy and integrity of the data without significantly compromising the image quality, which is a key innovation of our proposed MRA-VSS scheme.
In order to detect tampered pixels of stego images more effectively, and improve the payload size and PSNRs of stego images at the same time, in this paper, we designed a novel authenticable dual-image-based RDH based on the combination of diagonal pairing and intersection point, called MRA-VSS, a matrix-based reversible and authenticable visual secret-sharing scheme. In our scheme, a reference matrix was first established. Then, four frames that share a common intersection and overlapping boundaries were created. Each pixel pair from the grayscale secret image was divided into two parts, which were hidden using a cover pixel pair along with an authentication code. The diagonal pairing policy of two stego images was derived. In other words, our MRA-VSS scheme not only enhances the authenticity of stego images but also aligns with current trends in RDH technology. It enables the complete recovery of the original cover image after extracting the hidden data while preserving image quality, thereby underscoring the significant role of RDH in the field of data hiding technology.
The main contributions of the proposed MRA-VSS scheme are listed as follows:
- (1)
Two stego images maintain a good visual quality;
- (2)
Effectively authenticates the tampered pixels of stego images;
- (3)
Achieves robustness under RS analysis and the pixel value difference histogram (PDH) analysis.
The rest of this paper is organized as follows.
Section 2 briefly reviews Chang et al.’s scheme [
4] because their scheme is a pioneer in the field of dual-image-based RDH approach. The proposed authenticable dual-image-based RDH scheme MRA-VSS is described in
Section 3. The experimental results are presented in
Section 4. The conclusions are drawn in
Section 5.
2. Review of Authenticable Dual-Image-Based Schemes Using a Reference Matrix
Inspired by Zhang and Wang’s EMD data hiding scheme [
5], Chang et al. [
4] proposed the first dual-image-based RDH scheme using EMD reference matrix. In Chang et al.’s scheme, the secret data are transformed into a sequence of quinary digits, and a 256 × 256 EMD matrix
Mref indicates how to modify each cover pixel pair to conceal a quinary digit according to Equation (1):
where
Pi and
Pj are two neighboring pixels in a cover image and form a pixel pair. Using the mapping function defined in Equation (1), each pixel pair in a cover image can map one and only one element in the EMD matrix
Mref.
During the share construction phase, for a given cover pixel pair (
Pi,
Pj), it is mapped to an element denoted as
Mref(
Pi,
Pj) of matrix
Mref at the intersection of column
Pi and row
Pj. Later, a 5 × 5 block
B in matrix
Mref is formed using the mapped intersection as the central point and eight elements located at two diagonal lines are selected as the reference points, as shown in
Figure 1. It is noted that two diagonal lines of block
B include five different values ranging from 0 to 4.
The five elements situated at a diagonal line indicate a set of candidates for a pixel pair located at the same coordinate as Mref(Pi, Pj) of a share. By modifying the cover pixel pair Mref(Pi, Pj) to any element located at two diagonal lines, a quinary secret digit is concealed. Assume there are two quinary digits denoted as d1 and d2, Mref(P’i, P’j) = d1 and Mref(P’’i, P’’j) = d2. For share 1, the cover pixel pair Mref(Pi, Pj) is changed to Mref(P’i, P’j). For share 2, the cover pixel pair Mref(Pi, Pj) is changed to Mref(P’’i, P’’j). During extraction and restoration, the hidden secret quinary digits can be easily extracted by mapping the pixel pairs of shares to the EMD matrix Mref. Finally, the corresponding central points can be derived and pixel pairs of the cover image can be restored.
Although Chang et al.’s scheme [
4] does not provide an authentication mechanism, their share construction operation is simple and efficient. Inspired by their scheme, many scholars have subsequently proposed various schemes, trying to pursue breakthroughs in storage, security, and verifiability.
3. Proposed MRA-VSS Scheme
To increase the hiding capacity, and improve the verifiability while maintaining a competitive visual quality of shares, in this paper, a novel dual-image-based RDH scheme called MRA-VSS using a reference matrix and the combination of diagonal pairing and intersection point is proposed. The flowchart of the proposed dual-image-based RDH scheme is demonstrated in
Figure 2.
With our proposed MRA-VSS, a secret grayscale image that is half the size of the cover image can be concealed via two meaningful shares. In this section, the definitions of the proposed MRA-VSS scheme are presented first in
Section 3.1. Then, the details of the share construction, and secret extraction and verification phases are described in the following two subsections. The verification of integrity is presented in
Section 3.4. Finally, an example is demonstrated in
Section 3.5 to provide a better explanation for our proposed MRA-VSS scheme.
3.1. Definitions
In our proposed MRA-VSS scheme, there are two important structures: one is the reference matrix Mref and the other is the four frames within the matrix. In this section, the related definitions of these two structures are provided.
3.1.1. Reference Matrix Mref
Following the pixels’ values of a grayscale image, ranging from 0 to 255, for the reference matrix Mref, the value of X-axis ranges from 0 to 255, and the value of Y-axis also ranges from 0 to 255. The cellular values of reference matrix Mref are defined according to the following rules:
Rule 1: The values in each row increase sequentially from 0 to 8 from left to right.
Rule 2: The values of each row are repeated in the numerical order of (0, 1, 2, 3, 4, 5, 6, 7, 8).
Rule 3: From the bottom row to the top, the starting value of each row repeats the numerical order of 0, 3, and 6 in sequence.
Finally, a matrix
Mref served as a reference matrix is constructed for data embedding, as shown in
Figure 3.
3.1.2. Four Overlapping Frames
For a given cover pixel pair (
Pi,
Pj), such as (4,5), pixel
Pi maps to the X-axis of matrix
Mref and pixel
Pj maps to the Y-axis of matrix
Mref.
Mref(
Pi,
Pj) serves as the intersection point and four overlapping frames are then constructed, as shown in
Figure 3. Each frame overlaps with its neighboring frames with three neighboring pixels, and the intersection point pixel is the one that is covered with four frames. Four frames are denoted as Red, Green, Yellow, and Blue. The Red frame is located on the upper right up, and the rest three frames are Green, Yellow, and Blue in a counterclockwise direction order.
3.2. Construction of Dual Stego Images with Our Proposed Matrix-Based Crossover Data Hiding Strategy
To increase the hiding capacity while maintaining the reversibility of the cover image and competitive visual quality of two shares, a matrix-based crossover data hiding method is proposed in this subsection. Our proposed matrix-based crossover data hiding strategy comprises nine steps, as follows:
Step 1: Read two consecutive adjacent pixels (Pi, Pj) from the cover image CI as the cover pixel-pair and read four secret bits s1, s2, s3, and s4 from the secret bit stream S, where I = 1 to W, j = 1 to H, W is the width of the cover image, and H is the height of the cover image.
Step 2: Find the MSBs of Pi and Pj, and perform XOR operator to obtain one-bit ac serving as the authentication code.
Step 3: Construct the reference matrix
M based on the construction rules described in
Section 3.1.
Step 4: Duplicate the cover pixel pair (Pi, Pj) to two copies (P1i, P1j) and (P2i, P2j), where (P1i, P1j) belongs to stego image SI1 and (P2i, P2j) belongs to stego image SI2.
Step 5: Segment the four secret bits (
s1,
s2,
s3, and
s4) and one-bit
ac into two units
U1
= (
s1,
s2) and
U2
= (s3,
s4,
ac) and transform each unit into the decimal value
DU1 = decimal(
s1,
s2) and
DU2 = decimal(
s3,
s4,
ac), respectively:
where
decimal () is the decimal conversion function.
Step 6: Map the pixel pair (
P1i,
P1j) to matrix
Mref, set
Mref (
P1i,
P1j) as the intersection point, and then construct four frames according to the definitions provided in
Section 3.1.
Step 7: Select a frame for the pixel pair (
P1i,
P1j) according to the following rules:
where
DU1 is the decimal representation of unit
U1, and
U1 contains the first two secret bits
s1 and
s2 of the selected four successive secret bits.
Step 8: Find a pixel pair (P’1i, P’1j) of stego image SI1 from the frame determined in Step 7, and make sure Mref(P’1i, P’1j) = DU2, where DU2 is the decimal representation of unit U2, and U2 contains the last two secret bits, s3 and s3, of the selected four successive secret bits that are read in Step 1 and one-bit authentication code ac of the cover pixel pair (Pi, Pj).
Step 9: Modify (P2i, P2j) of stego image SI2 to (P’2i, P’2j) so that the frame where (P’2i, P’2j) located at is at the opposite direction of the frame to which (P’1i, P’1j) of stego image SI1 belongs. Also, (P’2i, P’2j) is located at the center position of its frame.
Step 10: Output (P’1i, P’1j) and (P’2i, P’2j) as the pixel pair of stego images SI1 and SI2, respectively.
Step 11: Judge whether the process of the cover pixel pairs and the secret data stream is completed; if it is not, return to Step 1. Otherwise, collect all outputted stego pixel pairs of stego images SI1 and SI2, and then, form stego images SI1 and SI2, respectively. Finally, two stego images are sent to two different participants separately.
Note that the matrix Mref does not need to be sent along with the stego image because the recipients can reconstruct the matrix Mref based on the pre-shared construction knowledge regarding matrix Mref. However, there is one assumption that must be held in advance to extract the hidden confidential data and restore the original cover image, which is that two participants must co-work and share his/her received stego image.
3.3. Recovery of Secret Data and Cover Image
When the dual stego images SI1 and SI2 are obtained, one recipient shares his/her received stego image with the other recipient and the extraction of hidden secret data and restoration of the cover image begins. The steps of the recovery of secret data and cover image are listed below:
Step 1: Read two consecutive adjacent pixels (P’1i, P’1j) of stego image SI1 and (P’2i, P’2j) of stego image SI2.
Step 2: Map (P’1i, P’1j) and (P’2i, P’2j) of stego images SI1 and SI2 to matrix Mref.
Step 3: Find the intersection point (
P’
i,
P’
j) based on the pixel pair (
P’
2i,
P’
2j) according to the following rules:
Step 4: Find
according to the following rules:
Transform D’U1 into a binary representation so that the first two hidden secret bits s’1 and s’2 are obtained.
Step 5: Find D’U2 = Mref(P’2i, P’2j) and transform D’U2 into a binary representation. Finally, the last two hidden secret bits s’3 and s’4 and one-bit ac’ are obtained.
Step 6: Output the intersection point (P’i, P’j) as the restored cover pixel pair and output the extracted four secret bits s’1, s’2, s’3, and s’4 and one-bit ac’.
Step 7: Judge whether the process of the pixel pairs of stego images SI1 and SI2 is completed; if it is not, return to Step 1. Otherwise, collect all restored pixel pairs and then form a restored cover image, collect all extracted secret bits, and form an extracted secret bit stream. Finally, collect all extracted authentication code ac’s and form an extracted authentication map for later integrity verification.
3.4. Verification of the Integrity of Stego Images
The matrix-based data hiding strategy demonstrated in
Section 3.2 always guarantees there are two relations of the relative position of two stego pixel pairs that are satisfied when they map to matrix
Mref: (1) both overlap with each other, or (2) there is a diagonal relationship between the stego pixel pairs (
P’1i,
P’1j) and (
P’2i,
P’2j) of stego images
SI1 and
SI2. These two relations will be used to check whether two stego images have been tampered with during the data transmission. Besides this diagonal relationship principle, two extra verification rules were designed in our proposed scheme. In general, our four integrity verification rules are listed below:
Rule 1: There is a diagonal relationship between the stego pixel pairs (P’1i, P’1j) and (P’2i, P’2j) of stego images SI1 and SI2 when these two stego pixel pairs map to matrix M and they are not mapped to the same coordinate.
Rule 2: The extracted one-bit authentication code ac’ must be equal to the XOR operation result of the MSBs of P’1i and P’1j, ), where MSB() is the most significant bit (MSB) function.
Rule 3: The Euclidean distance between the stego pixel pairs (P’1i, P’1j) and (P’2i, P’2j) is always lower than or equal to 4.3.
Rule 4: For a given pixel, when its two neighboring pixels are identified as having been tampered with, the current pixel is determined as having been tampered with.
The reason that the Euclidean distance between the stego pixel pairs (
P’1i,
P’1j) and (
P’2i,
P’2j) is always lower than or equal to 4.3 is that the stego pixel pair (
P’2i,
P’2j) marked in a pink triangle shape is located at the center point of the opposite frame of which frame the stego pixel pair (
P’1i,
P’1j) marked in an orange circle is located at, as shown in
Figure 4. Assume the stego pixel pair (
P’1i,
P’1j) of stego image
SI1 marked in an orange circle is located at (2, 7) in the Green frame and the stego pixel pair (
P’2i,
P’2j) marked in a pink tringle shape is located at (5, 4) in the Blue frame. Note that the center point of the Blue frame is fixed and its coordinate is (5, 4), and the coordinate that is located at the Green frame and maintains the farthest Euclidean distance from the center point of Blue frame is (2, 7). In this case, the Euclidean distance between (2, 7) and (5, 4) is 4.3(=
).
When one of the four rules is not satisfied, the corresponding stego pixel pairs will be judged as having been tampered with during transmission, and it is marked in the integrity map. The same verification process is conducted until all stego pixel pairs are checked. Finally, with the marked integrity map, the tampered cover pixel pairs can be identified. To further enhance the verification of our scheme, we implemented a refinement mechanism similar to that proposed in [
18], where a pixel is marked as having been tampered with if its two adjacent pixels have already been identified as having been tampered with.
3.5. Example of Our Proposed MRA-VSS Scheme
To provide a clear picture of our proposed construction of stego pixels, extraction, and recovery, an example that covers the above three operations is demonstrated in this subsection. Assume the cover pixel pairs are (4, 5) and the corresponding four secret bits are 0101. The MSBs of pixels 4 and 5 are 0 and 0, respectively; therefore, their authentication code is “0”. Segment four secret bits “0101” and one-bit authentication code “0” into two units: U1 = (01)2 and U2 = (010)2. Their decimal values are DU1 = 1 and DU2 = 2, respectively. Because DU1 = 1 and DU2 = 2, the Green frame is chosen, according to Equation (4), and (P’1i, P’1j) of stego image SI1 is set as (2, 6) due to Mref(P’1i = 2, P’1j = 6) = 2. The opposite frame of the Green frame is the Blue frame and the central point of the Blue frame is (5, 4); therefore, the stego pixel pair (P’2i, P’2j) of stego image SI2 is set as (5, 4).
Assuming two stego pixel pairs are delivered to two recipients safely, the recipients co-work with each other to extract the hidden secret bits and authentication code as follows: Because the received stego pixel pairs are (2, 6) and (5, 4), using (2, 6) and (5, 4), we can determine that the two pixel pairs are positioned in the Green and Blue frames, respectively. The cover pixel pair (4, 5) is obtained according to Equation (5). D’U2 = 2 is obtained after mapping (2, 6) to matrix M and its Mref(2, 6) = 2 is found, and D’U1 = 1 because the corresponding frame is Green, according to Equation (6). Transform the derived D’U1 = 1 and D’U2 = 2 into binary representations, the hidden secret bits, and one-bit authentication (01 010)2.
The pixel pairs of stego image SI2 are always located at the central point of its corresponding frames. Therefore, with such property, a stego image belonging to SI2 can be easily identified during the recovery of the cover image and secret data. To enhance the security of the hidden data, a secret key and a random number generator can be used to shuffle the order for pixel pairs of stego images SI1 and SI2. In this case, an RDH scheme without requiring extra information can be adapted to hide the identity of the stego image for later usage. Certainly, the hidden secret data also can be encrypted with a symmetric cryptographic algorithm to enhance its confidentiality.