TIRDH: A Novel Three-Shadow-Image Reversible Data Hiding Algorithm Using Weight and Modulo

IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Access Pub Date : 2025-03-18 DOI:10.1109/ACCESS.2025.3552661
Li-Chian Chin;Yu-Chen Li;Hung-Mo Hsieh;Chung-Ming Wang
{"title":"TIRDH: A Novel Three-Shadow-Image Reversible Data Hiding Algorithm Using Weight and Modulo","authors":"Li-Chian Chin;Yu-Chen Li;Hung-Mo Hsieh;Chung-Ming Wang","doi":"10.1109/ACCESS.2025.3552661","DOIUrl":null,"url":null,"abstract":"Reversible data hiding (RDH) in image media is crucial for securely embedding confidential information while ensuring complete recovery of both the cover image and the hidden data. Traditional RDH techniques often struggle to balance embedding capacity and image fidelity, limiting their practical effectiveness. This paper introduces TIRDH, a novel three-shadow-image RDH scheme that employs weight and modulo operations to achieve high-capacity embedding while preserving image quality. The method embeds an M-ary secret message within a shadow pixel cluster using a 3-tuple weight vector, modulo operations, and a variation table to guide pixel modifications. This guarantees data integrity without pixel underflow or overflow, thereby avoiding the falling-off boundary problem (FOBP) and ensuring reversibility. Additionally, the scheme offers flexible embedding rates, adjustable through a single parameter and weight vector, making it highly adaptable to various user requirements, image types, and application scenarios. Experimental results from three standard image databases demonstrate its effectiveness, achieving embedding rates ranging from 0.04 to 1.6814 bits per pixel while maintaining high image quality, with an average PSNR ranging from 47.65 to 62.65 dB. Furthermore, its prediction mechanism attains 98.2% accuracy, enabling precise performance estimation before actual message embedding. This predictive capability enhances efficiency by allowing users to anticipate the impact on image quality beforehand. Security assessments confirm strong resilience against RS steganalysis and pixel difference histogram attacks, providing enhanced protection for confidential data. Comparisons with 12 state-of-the-art methods show that the proposed approach outperforms competitors when embedding fewer than 50,000 secret bits and surpasses another set of 12 schemes when the embedding rate exceeds 1.0 bits per pixel. For 1,000 test images with an embedding rate of 1.4 bits per pixel, it consistently outperforms six leading RDH techniques, demonstrating robustness across diverse datasets. These findings establish our proposed TIRDH method as a comprehensive and reliable solution for RDH applications, offering superior embedding performance, high image quality, strong security, and practical adaptability across various real-world scenarios.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"49232-49248"},"PeriodicalIF":3.6000,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10930935","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10930935/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Reversible data hiding (RDH) in image media is crucial for securely embedding confidential information while ensuring complete recovery of both the cover image and the hidden data. Traditional RDH techniques often struggle to balance embedding capacity and image fidelity, limiting their practical effectiveness. This paper introduces TIRDH, a novel three-shadow-image RDH scheme that employs weight and modulo operations to achieve high-capacity embedding while preserving image quality. The method embeds an M-ary secret message within a shadow pixel cluster using a 3-tuple weight vector, modulo operations, and a variation table to guide pixel modifications. This guarantees data integrity without pixel underflow or overflow, thereby avoiding the falling-off boundary problem (FOBP) and ensuring reversibility. Additionally, the scheme offers flexible embedding rates, adjustable through a single parameter and weight vector, making it highly adaptable to various user requirements, image types, and application scenarios. Experimental results from three standard image databases demonstrate its effectiveness, achieving embedding rates ranging from 0.04 to 1.6814 bits per pixel while maintaining high image quality, with an average PSNR ranging from 47.65 to 62.65 dB. Furthermore, its prediction mechanism attains 98.2% accuracy, enabling precise performance estimation before actual message embedding. This predictive capability enhances efficiency by allowing users to anticipate the impact on image quality beforehand. Security assessments confirm strong resilience against RS steganalysis and pixel difference histogram attacks, providing enhanced protection for confidential data. Comparisons with 12 state-of-the-art methods show that the proposed approach outperforms competitors when embedding fewer than 50,000 secret bits and surpasses another set of 12 schemes when the embedding rate exceeds 1.0 bits per pixel. For 1,000 test images with an embedding rate of 1.4 bits per pixel, it consistently outperforms six leading RDH techniques, demonstrating robustness across diverse datasets. These findings establish our proposed TIRDH method as a comprehensive and reliable solution for RDH applications, offering superior embedding performance, high image quality, strong security, and practical adaptability across various real-world scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于权和模的三影图像可逆数据隐藏算法
图像介质中的可逆数据隐藏(RDH)对于安全嵌入机密信息,同时确保完全恢复封面图像和隐藏数据至关重要。传统的RDH技术往往难以平衡嵌入容量和图像保真度,限制了其实际效果。本文介绍了一种新的三阴影图像RDH方案,该方案采用权值和模运算来实现高容量嵌入,同时保持图像质量。该方法使用三元组权重向量、模操作和变量表来指导像素修改,在阴影像素集群中嵌入M-ary秘密消息。这保证了数据的完整性,没有像素下溢或溢出,从而避免了边界脱落问题(FOBP),确保了可逆性。此外,该方案提供灵活的嵌入率,可通过单个参数和权重向量进行调整,使其高度适应各种用户需求,图像类型和应用场景。三个标准图像数据库的实验结果证明了该方法的有效性,在保持高图像质量的同时,实现了0.04 ~ 1.6814比特/像素的嵌入率,平均PSNR为47.65 ~ 62.65 dB。此外,其预测机制达到98.2%的准确率,可以在实际消息嵌入之前进行精确的性能估计。这种预测功能允许用户事先预测对图像质量的影响,从而提高了效率。安全评估证实了对RS隐写分析和像素差异直方图攻击的强大弹性,为机密数据提供了增强的保护。与12种最先进的方法的比较表明,当嵌入少于50,000个秘密比特时,该方法优于竞争对手,当嵌入率超过每像素1.0比特时,该方法优于另一组12种方案。对于嵌入率为每像素1.4位的1,000张测试图像,它始终优于六种领先的RDH技术,在不同的数据集上显示出鲁棒性。这些研究结果表明,我们提出的TIRDH方法是RDH应用的全面可靠的解决方案,具有卓越的嵌入性能、高图像质量、强安全性和对各种现实场景的实际适应性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Access
IEEE Access COMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍: IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest. IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on: Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals. Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering. Development of new or improved fabrication or manufacturing techniques. Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.
期刊最新文献
Low-Cost FPGA-Enhanced CNN Accelerator for Real-Time YOLO Object Detection and Classification A Web-Ready and 5G-Ready Volumetric Video Streaming Platform: A Platform Prototype and Empirical Study Multi-Expert Trajectory Prediction for Highway Weaving Sections Using Conflict Potential Energy and GAN A Hybrid Fractional Chebyshev–Legendre Spectral Collocation Method for Hamilton–Jacobi–Bellman Equations Application-Specific Instruction-Set Processors (ASIPs) for Deep Neural Networks: A Survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1