DOI QR코드

DOI QR Code

A Two-Layer Steganography for Mosaic Images

  • Horng, Ji-Hwei (Department of Electronic Engineering, National Quemoy University) ;
  • Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University) ;
  • Sun, Kun-Sheng (Department of Electronic Engineering, National Quemoy University)
  • Received : 2020.10.19
  • Accepted : 2021.05.18
  • Published : 2021.09.30

Abstract

A lot of data hiding schemes have been proposed to embed secret data in the plain cover images or compressed images of various formats, including JPEG, AMBTC, VQ, etc. In this paper, we propose a production process of mosaic images based on three regular images of coffee beans. A primary image is first mimicked by the process to produce a mosaic cover image. A two-layer steganography is applied to hide secret data in the mosaic image. Based on the low visual quality of the mosaic cover image, its PSNR value can be improved about 1.5 dB after embedding 3 bpp. This is achieved by leveraging the newly proposed polarized search mask and the concepts of strong embedding and weak embedding. Applying steganography to the mosaic cover images is a completely new idea and it is promising.

Keywords

1. Introduction

With the rapid growth of Internet multimedia transmission, many steganographic techniques have been proposed to hide secret data in digital images. In 2006, Zhang and Wang proposed the exploiting modification direction (EMD) method [1]. The EMD data hiding scheme embeds a 5-ary secret digit in a pair of pixels by adjusting at most one pixel with value 1. Later, some improved schemes [2-3] were proposed to raise its hiding capacity. In 2014, Chang et al. proposed a turtle shell matrix [4] that can help to hide an 8-ary digit per pixel pair. It is advantageous to hide 2^n-ary digit, since the secret digit can be converted directly from integer number of binary secret bits. Many related works were proposed [5-9] to improve its performance.

In 2015, Kurup et al. proposed an octagon shaped shell matrix [10] to raise the hiding capacity of turtle shell-based scheme from three bits per pixel pair to four bits. In 2019, Leng further expanded the geometric size of octagon shaped shell [11]. By applying his generalized design rule, different-sized octagon shaped shell matrices can be obtained to embed three to eight bits per pixel pair.

In 2008, Chang et al. proposed a Sudoku-based data hiding scheme [12]. By leveraging the high complexity of Sudoku matrix, this scheme greatly improves the security of reference matrix-based approach. Many methods were proposed to improve the hiding capacity or visual quality of stego image [13-16].

In recent years, many reversible data hiding techniques were proposed [17-20]. After extraction of secret data, the cover image can be restored. However, the reversibility severely degrades the hiding capacity. Another interesting novel topic is secret image sharing [21-23]. The secret data is embedded into multiple different cover images or repetitions of the same cover image. Without cooperation of all image shares, the secret cannot be extracted.

Instead of hiding data in plain image, some researchers turned to embeding secret data into AMBTC [24] or JPEG [25-26] compressed images. Although the embedding capacity is much less than that of the plain image embedding, these methods are more practical for applications.

In this paper, we propose a novel and interesting topic of mosaic image data hiding. A mosaic image is synthesized by small image tiles to mimic a given primary image. By replacing image tiles and modification of pixel values, we can embed two layers of secret data in a mosaic image. The rest of this paper is organized as follows. Section 2 introduces a reference matrix-based data hiding scheme, which is a commonly applied data hiding scheme in recent years. In Section 3, the proposed scheme, including synthesis of mosaic images, the first and second layers of data hiding, and the corresponding extraction process, is presented. Experimental results are given in Section 4. Conclusions are presented in Section 5.

2. The data hiding based the generalized octagon shaped shell matrix

A series of reference matrix-based data hiding schemes have been proposed to hide secret data in a cover image. In 2014, Chang et al. proposed a turtle shell reference matrix [4] as shown in Fig. 1. It is so ingeniously designed that any arbitrarily selected element can find all distinct integer values from 0 to 7 in its vicinity. Through guidance of the turtle shell matrix, three bits of secret data can be embedded to each pair of pixels.

E1KOBZ_2021_v15n9_3298_f0001.png 이미지

Fig. 1. The turtle shell reference matrix proposed in [1].

In their scheme, the cover image is divided into mutually exclusive pixel pairs first. Then, the gray level values of each pixel pair are applied as coordinates and mapped to an element in the turtle shell matrix. According to the decimal value of three secret bits to be embedded, the nearest element with its value matched the secret value is selected as target. Then, the coordinates of the matched element are recorded to the stego image. This procedure is repeated until all pixel pairs are processed. Since a target element can always be found in vicinity of the mapped element, the resulting stego image looks the same as the cover image. In other words, the difference between them cannot be distinguished by human eyes.

Later, the idea of turtle shell matrix was expanded to the octagon-shaped shell [10] and the generalized octagon-shaped shell [11] matrices as shown in Fig. 2. The embedding capacity of a pixel pair can be raised to four bits by compactly arranging sixteen distinct integer values of 0 to 15 in each of the consecutive octagons [10] as shown in Fig. 2(a). Leng further expanded the size of an octagon to include 2^n elements [11] and thus it can be applied to embed n bits of secret data for each cover pixel pair. Of course, the search range of target element should be increased with the expansion of octagonal size. Thus, the displacement of coordinates is increased and the visual quality of stego images is also degraded at the same time.

E1KOBZ_2021_v15n9_3298_f0002.png 이미지

Fig. 2. The generalized octagon shaped shell reference matrices.

3. The proposed scheme

In this paper, we propose a two-layer data hiding scheme for mosaic images. In this section, we first introduce our procedure of mosaic image production. Then, the data hiding scheme for the first layer and the second layer embedding and extraction are presented.

3.1 Synthesis of Mosaic Images

A mosaic image, also called a photomosaic, is an image that has been divided into tiled sections, each of which is replaced with an image tile that best represents the target section. When viewed at a low resolution, it looks like the primary image, while close examination reveals the texture of the image tiles.

3.1.1 Library of image tiles

To produce mosaic images, a library of image tiles has to be set up first. In this paper, we apply three images of coffee beans with size 512×512[27-29] as shown in Figs. 3(a)-(c) to generate the elementary image tiles. Their corresponding histograms are given in Figs. 3(d)-(f), which are mainly distributed in the ranges of high, median, and low, respectively.

E1KOBZ_2021_v15n9_3298_f0003.png 이미지

Fig. 3. Three images of coffee beans (a) - (c) with their histograms (d) - (f).

By duplicating the coffee bean images and modifying their gray level with linear transformation, 7 images with different ranges of gray level distribution are produced. Each of which is then divided into 32×32 image tiles of size 16×16. It results in 7, 168 tiles in the whole image library. Since all of the elementary image tiles come from the coffee bean images, there is only a single tone of brown color. To represent arbitrary images, we have to leverage their luminance. The color space of image tiles is converted from RGB to YIQ, where Y is the luminance representation of the image tiles.

The elementary image tiles are sorted by average luminance and the 256 tiles that best match the integer gray level values from to are selected as the candidate tiles. The gray level distribution of each candidate tile is then fine-tuned to optimize its average gray level. In this way, we can obtain a library of image tiles 𝑈 = {𝐵𝑖(𝑥,𝑦|𝑥,𝑦 = 0,1,2,…,15;𝑖 = 0,1,2,…,255} that contains 256 members, the corresponding gray level value 𝑖 of the image tile 𝐵𝑖(𝑥,𝑦) is defined as tile index.

3.1.2 Tiling mosaic images

Based on the library of coffee bean image tiles, we can produce a mosaic image to mimic any arbitrarily given primary image. The input image is divided into blocks of size 16×16 first. Then, the color space is converted into YIQ domain. By averaging the Y values of each block, we can obtain an index matrix and tile the mosaic image according to it. The algorithm for generating a mosaic image to mimic a given primary image is provided as follows.

Algorithm: Generation of mosaic image

Fig. 4(a) shows a true color image with size 1600 × 1792 of a tiger [27]. The resulted mosaic image is shown in Fig. 4(b). Since it is produced with coffee bean images of a single tone, the mosaic image is basically brown color with a texture of coffee beans.

E1KOBZ_2021_v15n9_3298_f0004.png 이미지

Fig. 4. The mosaic image production: (a) an image of a tiger, (b) its corresponding mosaic image produced with the library of coffee bean image tiles.

3.2 The first layer of data hiding

To hide secret data into a mosaic image, we apply a modified version of the turtle shell matrix-based data hiding scheme [4] proposed by Chang et al. in 2014. Refer to Fig. 5, the red rectangular region of mosaic image “Tiger” in (a) is magnified as shown in (b). By converting to the YIQ color space and averaging luminance of each image tile, we can obtain the index matrix. Refer to Fig. 6, the mosaic image (a) is a copy of Fig. 5(b). Part of index values of Fig.6(a) is shown in (c), where the corresponding ranges of pixel addresses are labeled in the gray axial frame.

E1KOBZ_2021_v15n9_3298_f0005.png 이미지

Fig. 5. A close examination: (a) the mosaic image “Tiger”, (b) a close examination of the upper-left square region of (a).

E1KOBZ_2021_v15n9_3298_f0006.png 이미지

Fig. 6. A demonstration of the turtle shell matrix-based data hiding for mosaic images.

The indices of the index matrix are divided into index pairs. Through the guidance of turtle shell matrix as shown in Fig. 7, each pair of indices can be applied to embed three bits of secret data. An example index pair of (153, 128) in Fig. 6(c) maps to the red color element as shown in Fig. 7(a). Suppose the three bits to be embedded are (100)2. Thus, the matched target element is (152, 128). The two coordinates are recorded to the index matrix of stego image as shown in Fig. 6(d) and their corresponding image tiles are posted to Fig. 6(b). The second example is the green index pair (112, 123) in Fig. 6(c). The mapped element with its vicinity in the reference matrix is shown in Fig. 7(b). Suppose the secret bits to be embedded are (110)2. The matched target element is the yellow element. Then, its coordinates and corresponding image tiles are recorded to Figs. 6(d) and 6(b), respectively. In this way, (113, 124) the index matrix is modified with the turtle shell-based data hiding scheme and the stego mosaic image is tiled according to the modified index matrix. The algorithm for the first layer of data hiding is summarized as follows.

E1KOBZ_2021_v15n9_3298_f0007.png 이미지

Fig. 7. Illustration of the data hiding process.

Algorithm: The first layer of data hiding for mosaic images

3.3 The second layer of data hiding

In the first layer of data hiding, we simply embed secret data by image tile replacement. The only type of modification is to replace an image tile with another image tile of close index value. In the second layer of data hiding, we treat the luminance of first layer-embedded mosaic image as an ordinary cover image and apply the octagon-shaped shell scheme [11] to embed secret data in the pixel level instead of the tile level. A major difference from the conventional embedding is that the visual quality of our stego image is evaluated based on the primary image but not the cover/mosaic image.

In the conventional reference matrix-based embedding, the search range of target element is centered at the element mapped by the cover pixel pair. In the new situation, we have to know the relationship between the current mosaic pixel pair and the primary pixel pair in advance. When we modify the mosaic pixel value toward the primary pixel value, the visual quality of stego image is improved after embedding. To gain this effect, we propose a polarized search mask for reference matrix.

The idea is illustrated in Fig. 8, where three different relationships between the mosaic pixel values and the primary pixel values are considered. The principle for mask setting is to include the element mapped by the cover pixel pair and drift toward the element mapped by the primary pixel pair. Based on the polarized mask, secret data can be embedded with a least modification of cover pixel values and a reduction of error with respect to their corresponding primary pixel values.

E1KOBZ_2021_v15n9_3298_f0008.png 이미지

Fig. 8. The polarized search mask for turtle shell matrix with different conditions.

Why don’t we stretch further toward the primary pixel value and gain an even better visual quality? The answer is that modification of pixel values result in the drift of average luminance and thus may lead to error decoding of the first layer data. Therefore, the total amount of deviations should be carefully controlled.

To permit more flexibility of embedding, we enlarge the polarized search mask to enclose more elements in the reference matrix. Thus, multiple matched target elements can be found to embed an assigned secret digit. An example is illustrated in Fig. 9, where the polarized mask is enlarged to 5×5. Suppose the three bits to be embedded are (010)2. Three matched elements can be found in the polarized mask. Recording the coordinates of the element closest to the cover element is defined as weak embedding (WE), while recording the element closest to the primary element is defined as strong embedding (SE).

E1KOBZ_2021_v15n9_3298_f0009.png 이미지

Fig. 9. An illustration of weak embedding and strong embedding.

Before deciding the embedding strategy, the relationship between a mosaic tile and its corresponding block in the primary image should be investigated first. The mosaic tile and its corresponding primary image block are denoted by and , respectively. For each mosaic tile, we calculate its positive difference rate (PD rate) by

 \(\text { PD rate }=\frac{1}{16 \times 16} \sum_{x, y} \operatorname{sign}[P(x, y)-M(x, y)]\)       (1)

where the function 𝑠ign(∙) is defined by

\(\operatorname{sign}(n)= \begin{cases}1, & n>0 \\ 0, & n \leq 0\end{cases}\)       (2)

The PD rate is used to calculate the percentage of pixels in the tile. It requires positive adjustment of pixel value to approach the one. According to the PD rate, the image tiles are classified into three types as illustrated in Fig. 10. In the second layer of embedding, we propose three different strategies to process different types of mosaic tiles.

E1KOBZ_2021_v15n9_3298_f0010.png 이미지

Fig. 10. Classification of embedding strategy.

According to the sign value of difference sign [P(x,y) - M(x,y)], the pixel pairs in a mosaic tile can be divided into four groups of (+, +), (+, −), (−, +), and (−, −),where P(x,y) > M(x,y) is denoted by ‘+’; while P(x,y) ≤ M(x,y) is denoted by ‘−’. For example, let the cover pixel pair be (121, 89) and its corresponding primary pixel pair be (123, 80). Since 123 > 121 and 80 ≤ 89, this pixel pair is classified to the group of (+, −).

For mosaic tiles of Type I, we apply enlarged version of polarized search mask with strong embedding (SE) to process all pixel pairs. Since the PD rate is around fifty percent, the positive and negative deviations caused by embedding tend to cancel out each other.

For mosaic tiles of Type II+, strong embedding (SE) is applied to the (−, −) group of pixel pairs, while weak embedding (WE) is applied to the other groups. For complementary distribution of Type II-, SE is applied to the (+, +) group of pixel pairs, while WE is applied to the other groups. The principle is to permit further stretch for group of lower population. Thus, the total amount of positive and negative deviations are balanced.

For mosaic tiles of Type III+, SE is applied to all pixel pairs in (−, −) group and equal amount of pixel pairs in (+, +) group by random selection. For the remainder, conventional embedding (CE) is applied. The equal amount of (−, −) and (+, +) pixel pairs tend to cancel out deviations, while the deviations produced by CE are symmetrically distributed. Analogue rules are applied to the complementary distribution of Type III-.

To ensure correct decoding of tile index, the average luminance of each stego mosaic tile should be within a predefined tolerance. For instance, the average luminance of a mosaic tile with index 𝑁 should be within the range of (𝑁−0.4, 𝑁+0.4) after embedding. Compensation process should be taken when it is out of the tolerance range. Two possible ways of compensation are to weaken the embedding strength of over deviation group or to strengthen the embedding strength of under deviation group. The strength of embedding listed in the descending order are SE, WE, and CE. The algorithm for the second layer of data hiding is summarized as follows.

Algorithm: The second layer of data hiding for mosaic images

3.4 Extraction of secret data

Comparing with the embedding process, secret data extraction of the proposed scheme is relatively simple. The secret data embedded in the second layer is extracted first. Then, the index of each mosaic tile is decoded to extract the data embedded in the first layer. The secret data extraction algorithm is given as follows.

Algorithm: The secret data extraction

4. Experimental results

To demonstrate the applicability of the proposed data hiding scheme, we use the platform of Microsoft Windows running on a personal computer. The data embedding and extraction algorithms are programmed with MATLAB language. Four test primary cover images[27] are shown in Fig. 11, which are (a) “Tiger” sized 1600 × 1792, (b) “Cat” sized 2288 × 3008, (c) “Sphinx” sized 3200 × 2080, and (d) “Squirrel” sized 3200 × 2144.

E1KOBZ_2021_v15n9_3298_f0011.png 이미지

Fig. 11. Four test images in our experiment.

4.1 Main performance evaluations

The experimental results of “Tiger” are shown in Fig. 12, where (a) is the mosaic image produced by the method introduced in Section 3.1, (b) is the stego image produced by the first-layer data embedding, (c) to (f) are the final stego-images with different embedding rates in the second-layer. The applied embedding rates are 1.5, 2, 2.5, and 3 bits per pixel (bpp), respectively, i.e., the octagon-shaped shell matrices of 23, 24, 25, and 26-ary versions are applied in the reference matrix-based data hiding scheme. A zooming-in version of Fig. 12 is given in Fig. 13. The region of interest is focused on an eye of the tiger. It is obvious that every details of the figures are constituted by the mosaic image tiles of coffee beans.

E1KOBZ_2021_v15n9_3298_f0012.png 이미지

Fig. 12. The experimental results of “Tiger”: (a) the produced mosaic image, (b) the stego-image with first-layer data embedded, and (c) to (f) the final stego-images with different embedding rates in the second-layer.

E1KOBZ_2021_v15n9_3298_f0013.png 이미지

Fig. 13. A zooming-in version of Fig. 12 with the region of interest on an eye of the tiger.

E1KOBZ_2021_v15n9_3298_f0014.png 이미지

Fig. 14. The experimental results of “Cat”: (a) the produced mosaic image, (b) the stego-image with first-layer data embedded, and (c) to (f) the final stego-images with different embedding rates in the second-layer.

E1KOBZ_2021_v15n9_3298_f0015.png 이미지

Fig. 15. A zooming-in version of Fig. 14 with the region of interest on an eye of the cat.

E1KOBZ_2021_v15n9_3298_f0016.png 이미지

Fig. 16. The experimental results of “Sphinx”: (a) the produced mosaic image, (b) the stego-image with first-layer data embedded, and (c) to (f) the final stego-images with different embedding rates in the second-layer.

E1KOBZ_2021_v15n9_3298_f0017.png 이미지

Fig. 17. A zooming-in version of Fig. 16 with the region of interest on the head of Sphinx.

E1KOBZ_2021_v15n9_3298_f0018.png 이미지

Fig. 18. The experimental results of “Squirrel”: (a) the produced mosaic image, (b) the stego-image with first-layer data embedded, and (c) to (f) the final stego-images with different embedding rates in the second-layer.

E1KOBZ_2021_v15n9_3298_f0019.png 이미지

Fig. 19. A zooming-in version of Fig. 18 with the region of interest on the face of the squirrel.

Similar results are obtained for the rest of three primary cover images, which are given in Figs. 14 to 19. The differences between the mosaic images of different embedding rates are imperceptible. To assess the quality of the stego-images, the peak signal to noise ratio (PSNR) is applied as the index. The PSNR is defined by

\(P S N R=10 \log _{10} \frac{255^{2}}{M S E}(\mathrm{~dB})\)       (3)

\(M S E=\frac{1}{W \times H} \sum_{j=1}^{W} \sum_{i=1}^{H}\left(p^{\prime}(i, j)-p(i, j)\right)^{2}\)       (4)

where p'(i,j) and p(i,j) represent the pixels of the stego-image and the cover mosaic image, respectively; 𝑊 and 𝐻 are the width and height.

The PSNR values of the mimic mosaic image and the first-layer data embedded stego-images are listed in Table 1. Note that, since the mosaic image tiles have only a single tone in color, the PSNR values are all measured with luminance of the images. As shown in the table, the PSNR values just slightly degrade after first-layer embedding for all of the four cases.

Table 1. The PSNR values, in dB, of the first-layer data embedded stego images.

E1KOBZ_2021_v15n9_3298_t0001.png 이미지

The PSNR values of the final stego-images are listed in Table 2, where PSNR values for four different embedding rates of the second-layer are given. It is interesting that the PSNR value gradually rises with the increasing embedding rate. The evolution of PSNR value from the first-layer embedding to the second-layer embedding with four different embedding rates is plotted in Fig. 20, where the evolutionary curves for all of the four mosaic cover images are given. Table 3 lists the PSNR values for conventional reference matrix-based data hiding methods under different embedding rates. As the embedding rate raises from 1.5 to 3.0 bits per pixel, the PSNR value degrades about 10 dB. Since a wider search range is required to embed more secret bits in a cover pixel pair, the resulting modification of pixel value is greater. However, the embedding of our scheme is based on a mimic mosaic image. Under strong embedding, pixel values are modified in a way toward their original values. Therefore, the PSNR value increases with embedding rate. But this phenomenon gradually saturates at about 3 bits per pixel in our experiment. The total embedding capacity of the four mosaic cover images with different embedding rates are given in Table 4.

Table 2. The PSNR values of the final stego images with different embedding rates.

E1KOBZ_2021_v15n9_3298_t0002.png 이미지

E1KOBZ_2021_v15n9_3298_f0020.png 이미지

Fig. 20. PSNR values of the stego-images with different embedding rates.

Table 3. PSNR values of reference matrix-based methods under different embedding rates.

E1KOBZ_2021_v15n9_3298_t0003.png 이미지

Table 4. Total embedding capacity for the four mosaic images with different embedding rates of the second-layer.

E1KOBZ_2021_v15n9_3298_t0004.png 이미지

4.2 Detailed data and parameter settings

In the second layer of data embedding, the octagon-shaped shell matrix [11] should be constructed according to the predefined embedding rate. The parameter settings for different embedding rates with their corresponding radix numbers are listed in Table 5, each provided parameter set (𝑚,𝑛,𝑘) gives the best PSNR performance in comparison with the other octagon solutions of the same radix number system.

Table 5. Parameter settings of octagon-shaped shell matrix for different ERs.

E1KOBZ_2021_v15n9_3298_t0005.png 이미지

For the strong embedding (SE), the size of search mask is enlarged to allow a more flexible modification of pixel values. The experimental sizes of the enlarged masks for different embedding rates are given in Table 6.

Table 6. Sizes of search mask for the SE with different ERs.

E1KOBZ_2021_v15n9_3298_t0006.png 이미지

Upon embedding the second layer of secret data, the embedding strategy is decided by the positive difference (PD) rate of the image tile under processing. The actual distributions of PD rates for different mosaic cover images are plotted in Fig. 21. It is advantageous that most of the image tiles are populated around the PD rate of 50%, since we can apply the SE for all pixel pairs in this tile and effectively improve the visual quality of the stego-image. Table 7 shows the type distributions of the image tiles. Over ninety percent of the image tiles belong to the type I for all of the four images. That is why the stego-image quality is improved after the second-layer of embedding.

E1KOBZ_2021_v15n9_3298_f0021.png 이미지

Fig. 21. Distributions of the PD rates, in percentage, for the four mosaic cover images.

Table 7. Type distribution of image tiles in percentage.

E1KOBZ_2021_v15n9_3298_t0007.png 이미지

After the second-layer of data embedding, overflow or underflow of the average luminance is frequently encountered. The percentage of image tiles that result in overflow or underflow of luminance are listed in Tables 8 to 11 for different ERs. All values are represented in percentage with respect to the total image tiles of the whole mosaic image. As ER increases, the percentage of violating tiles also increases. It seems to reach a saturation at fifty percent. Details of the compensation strategies are listed in Table 12. For example, when the current image tile under processing belongs to Type I and the average luminance after embedding is below the lowest bound, we compensate by consecutively alternating the SE of (−, −) pixel pairs with WE until the luminance is back to the formal range. In our experiments, all of the stego-image tiles can be adjusted to the formal state by leveraging the proposed compensation strategy. In the worst case, the CE can always preserve the average luminance of an image tile and the steganography can be executed without exception.

Table 8. Over and Under-flows of average luminance for the ER of 1.5bpp.

E1KOBZ_2021_v15n9_3298_t0008.png 이미지

Table 9. Over and Under-flows of average luminance for the ER of 2bpp.

E1KOBZ_2021_v15n9_3298_t0009.png 이미지

Table 10. Over and Under-flows of average luminance for the ER of 2.5bpp.

E1KOBZ_2021_v15n9_3298_t0010.png 이미지

Table 11. Over and Under-flows of average luminance for the ER of 3bpp.

E1KOBZ_2021_v15n9_3298_t0011.png 이미지

Table 12. Compensation strategy for different situations.

E1KOBZ_2021_v15n9_3298_t0012.png 이미지

4.3 Security analysis

To assess the security level of the proposed data hiding scheme, many steganalysis, including machine learning-based [30], deep learning-based [31], and pixel-value differencing [32], techniques are available. The reference matrix-based data hiding schemes usually divide cover image into pixel pairs and embed secret data in a pair-wise manner. The pixel-value differencing histogram steganalysis [32] is devised specifically for analyzing such data hiding schemes.

The pixel-value differencing histogram (PDH) for four series of stego images produced by our data hiding scheme are plotted in Fig. 22. In each figure, PDH for the mosaic cover image, the stego images of the first-layer embedding and the second-layer embedding of different embedding rates are given. Notice that the curves of the cover mosaic image and the stego image of the first-layer embedding are exactly aligned with each other. Since the first-layer embedding only involves block-wise replacement of mosaic tiles, the differences between neighboring pixel values are preserved. For the stego images of complete (two-layers) embedding, the curve is gradually flattened as the embedding rate increases. This phenomenon is exactly the same as conventional reference matrix-based methods.

E1KOBZ_2021_v15n9_3298_f0022.png 이미지

Fig. 22. Pixel-value differencing histogram for the four series of stego images.

5. Conclusions

We use three images of coffee beans to generate a library of image tiles. The generating process includes partition in the space domain and linear transformation of pixel values. Then, the image tiles are applied to mimic the given primary cover images and produce the mosaic images.

A two-layer image steganography is proposed to hide secret data in the mosaic images. In the first layer of embedding, turtle shell matrix-based data hiding scheme is applied to the tile level of the cover image. Secret data is embedded by alternating between the image tiles of close luminance. In the second layer of embedding, octagon-shaped shell matrix is applied to hide secret data in the pixel level. The embedding rate can be adjusted by leveraging differently sized octagons.

We define a polarized search mask with the SE and WE techniques to make the modification of pixel values more flexible. In addition, a compensation strategy is designed to preserve the luminance order of image tiles from being disturbed, which is essential information for the extraction of first-layer data.

Experimental results show that the proposed mosaic production process can successfully mimic the given primary images. Based on the low PSNR values of the mosaic cover images, a large amount of secret data can be embedded. In the second layer of embedding, the PSNR value of the stego-image with respect to the primary cover image increases with the increasing of embedding rate and reaches a saturation at 3 bpp. We hope this article can open a new direction of applying steganography to the mosaic images. Besides, we believe in the future, there will be more and more studies which present novel and promising methods in this issue.

References

  1. X. Zhang, S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, Nov. 2006. https://doi.org/10.1109/LCOMM.2006.060863
  2. H. J. Kim, C. Kim, Y. Choi, et al., "Improved modification direction methods," Comput. Math.Appl, vol. 60, no. 2, pp. 319-325, 2010. https://doi.org/10.1016/j.camwa.2010.01.006
  3. T. D. Kieu, C. C. Chang, "A steganographic scheme by fully exploiting modification directions," Expert system with applications, vol. 38, no. 8, pp. 10648-10657, 2011. https://doi.org/10.1016/j.eswa.2011.02.122
  4. C. C. Chang, Y. Liu, T. S. Nguyen, "A novel turtle shell-based scheme for data hiding," in Proc. of 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIHMSP), Kitakyushu, Japan, pp. 89-93, Aug. 2014.
  5. Y. Liu, C. C. Chang, T. S. Nguyen, "High capacity turtle shell-based data hiding," IET Image Process, vol. 10, no. 2, pp. 130-137, 2016.
  6. Q. Jin, Z. Li, C. C. Chang, et al., "Minimizing turtle-shell matrix based stego image distortion using particle swarm optimization," Int. J. Netw. Secur., vol. 19, no. 1, pp. 154-162, 2017.
  7. L. Liu, C. C. Chang, A. Wang, "Data hiding based on extended turtle shell matrix construction method," Multimedia Tools Appl, vol. 76, pp. 12233-12250, 2017. https://doi.org/10.1007/s11042-016-3624-7
  8. X. Z. Xie, C. C. Lin, C. C. Chang, "Data hiding based on a two-layer turtle shell matrix," Symmetry, vol. 10, no. 2, pp. 47, 2018. https://doi.org/10.3390/sym10020047
  9. J. H. Horng, J. Lin, Y. J. Liu, C. C. Chang, "3D Multilayered Turtle Shell Models for Image Steganography," Computer Modeling in Engineering & Sciences, vol. 125, no. 2, pp. 879-906, 2020. https://doi.org/10.32604/cmes.2020.09355
  10. S. Kurup, A. Rodrigues, A. Bhise, "Data hiding scheme based on octagon shaped shell," in Proc. of International Conference on Advances in Computing, Communication and Informatics, Kerala, India, pp. 1982-1986, 2015.
  11. H. S. Leng, "Generalized scheme based on octagon-shaped shell for data hiding in steganographic applications," Symmetry, vol. 11, no. 6, pp. 1-10, 2019.
  12. C. C. Chang, Y. C. Chou, T. D. Kieu, "An information hiding scheme using Sudoku," in Proc. of 3rd Int. Conf. Innov. Comput. Inf. Control (ICICIC), Dalian, China, pp. 17-22, Jun. 2008.
  13. M. Z. He, Y. J. Liu, C. C. Chang, et al., "A mini Sudoku matrix-based data embedding scheme with high payload," IEEE Access, vol. 7, pp. 141414-141425, 2019. https://doi.org/10.1109/access.2019.2943616
  14. W. Hong, "Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique," Information Sciences, vol. 221, pp. 473-489, 2013. https://doi.org/10.1016/j.ins.2012.09.013
  15. X. Liao, S. Guo, J. Yin, H. Wang, X. Li, A. K. Sangaiah, "New cubic reference table based image steganography," Multimed Tools Appl, vol. 77, pp. 10033-10050, 2018. https://doi.org/10.1007/s11042-017-4946-9
  16. J. Lin, J. H. Horng, Y. Liu and C. C. Chang, "An Anisotropic Reference Matrix for Image Steganography," Journal of Visual Communication and Image Representation, Vol. 74, 102969, January 2021. https://doi.org/10.1016/j.jvcir.2020.102969
  17. T. S. Nguyen, C. C. Chang, "A reversible data hiding scheme based on the Sudoku technique," Displays, vol. 39, pp. 109-116, 2015. https://doi.org/10.1016/j.displa.2015.10.003
  18. C. C. Chang, C. T. Li, and K. Chen, "Privacy-preserving reversible information hiding based on arithmetic of quadratic residues," IEEE Access, vol. 7, no. 1, pp. 54117-54132, 2019. https://doi.org/10.1109/ACCESS.2019.2908924
  19. C. C. Chang, C. T. Li, Y. Q. Shi, "Privacy-aware reversible watermarking in cloud computing environments," IEEE Access, vol. 6, no. 1, pp. 70720-70733, 2018. https://doi.org/10.1109/ACCESS.2018.2880904
  20. Y. Shi, X. Li, X. Zhang, H. Wu and B. Ma, "Reversible data hiding: Advances in the past two decades," IEEE Access, vol. 4, pp. 3210-3237, 2016. https://doi.org/10.1109/ACCESS.2016.2573308
  21. C. N. Yang, T. S. Chen, K. H. Yu and C. C. Wang, "Improvements of image sharing with steganography and authentication," Journal of Systems and Software, vol. 80, no. 7, pp. 1070-1076, 2007. https://doi.org/10.1016/j.jss.2006.11.022
  22. C. C. Chang, C. T. Li, "Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems," Math. Biosci. Eng, vol. 16, no. 5, pp. 3367-3381, 2019. https://doi.org/10.3934/mbe.2019168
  23. K. Gao, J. H. Horng, Y. J. Liu, and C. C. Chang, "A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix," IEEE Access, vol. 8, pp. 130405-130416, 2020. https://doi.org/10.1109/access.2020.3009410
  24. J. H. Horng, C. C. Chang, G. L. Li, "Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images," IEEE Access, vol. 8, pp. 129347-129358, 2020. https://doi.org/10.1109/access.2020.3009232
  25. F. Huang, X. Qu, H. J. Kim and J. Huang, "Reversible data hiding in JPEG images," IEEE Transactions on Circuits Systems for Video Technology, vol. 26, no. 9, pp.1610-1621, 2016. https://doi.org/10.1109/TCSVT.2015.2473235
  26. Y. Li, S. Yao, K. Yang, et al., "A High-imperceptibility and histogram-shifting data hiding scheme for JPEG images," IEEE Access, vol. 7, pp. 73573-73582, 2019. https://doi.org/10.1109/access.2019.2920178
  27. https://www.pexels.com/zh-tw/.
  28. https://unsplash.com/.
  29. https://www.kdccoffee.com/.
  30. J. Fridrich and J. Kodovsky, "Rich Models for Steganalysis of Digital Images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, June 2012. https://doi.org/10.1109/TIFS.2012.2190402
  31. Dengpan, Y., Shunzhi, J., Shiyu, L. et al., "Faster and transferable deep learning steganalysis on GPU," J Real-Time Image Proc, 16, 623-633, 2019. https://doi.org/10.1007/s11554-019-00870-1
  32. Zhang, X., Wang, S., "Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security," Pattern Recognition Letters, vol. 25, no. 3, 331-339, 2004. https://doi.org/10.1016/j.patrec.2003.10.014