Final
Final
Signal Processing
journal homepage: www.elsevier.com/locate/sigpro
a r t i c l e i n f o a b s t r a c t
Article history: Biswapati et al. proposed a interpolation-based hiding scheme. The scheme directly conceals the infor-
Received 23 February 2017 mation, which records the position of the modified pixel to generate the stego-image. The position value
Revised 20 July 2017
is very large, thus creating a large image distortion. This study reduces the value range of the position
Accepted 22 July 2017
values and re-encodes the values to reduce the distortion.
Available online 24 July 2017
The proposed scheme examines the probabilities for the position values and re-encodes the value ac-
Keywords: cording to its occurrence number. A re-encode function is used to obtain the rank of the position value
Image interpolation in descending order. The most frequent position value is re-encoded to zero. The re-encoded codes are
Reversible information hiding positive numbers, and the values of the codes are still large. To narrow down the value, the re-encoded
Re-encoding codes are ciphered to generate mapping codes with negative and positive numbers. A mapping function is
RS analysis proposed to map the re-encoded code to the mapping code. The mapping code is half of the re-encoded
code such that the image distortion becomes small.
The proposed scheme uses different sizes of embedding blocks to control the hiding rate and image
quality. Compared with other state-of-the-art methods, the proposed scheme is better in terms of hiding
payload and image quality.
© 2017 Elsevier B.V. All rights reserved.
1. Introduction togram shifting, difference expansion, dual images, and image in-
terpolation.
The information hiding technique is used to share secret mes- The difference expansion (DE) technique computes the distance
sages, detect tampered data, verify ownership, track piracy, and between two pixels (or prediction value and pixel) and conceals
augment data. In an information hiding scheme, cover media, such secret bits into any two-time distances. Tian [10], Alattar [1], and Li
as image, video, text, execution file, and audio, could be used to et al. [7] proposed DE-based RDH methods to generate the stego-
carry the secret message. The media that carries the message is image. DE-based RDH schemes can effectively embed secret infor-
called a stego-media. Unauthorized persons cannot detect any dif- mation in the cover image. However, this technique can cause great
ference between the cover media and the stego-media. This study distortion, which diminishes the image quality of the stego-image.
uses an image as the cover media to conceal the secret message Histogram-shifting hiding techniques are proposed to improve
for generating the stego-image [8,10]. the quality of the stego-image using the DE method. The histogram
Information hiding schemes can be categorized into two types, technique computes the probability of pixels to generate a his-
namely, reversible and non-reversible, according to whether the togram and points out the peak pixel in the histogram to embed
stego-image can be reversed or not. The reversible data-hiding the information. The other pixels between the peak pixel and a
(RDH) scheme can recover the original image after the concealed zero pixel are shifted to create a space for hiding the secret mes-
message is extracted. Conversely, the non-reversible hiding scheme sage. For example, Ni, and Lee et al. proposed histogram-shifting-
cannot recover the stego-image to its original state. Research has based hiding schemes [8,6]. The image quality of the histogram-
proposed many related schemes given that the RDH technique shifting-based scheme is high, but the embedding payload is low.
can be used in many applications, such as military use, medical Dual-image-based techniques were proposed in 2014 to en-
purposes, and digital archiving. Recent RDH schemes include his- hance the embedding payload. The dual-image-based RDH scheme
replicates the original image to generate two copy images and con-
ceals information in two images. For example, Qin et al. applied
the modulus function and exploited the modification direction and
E-mail address: tclu@cyut.edu.tw three embedding rules to generate two stego-images [17]. Lu et al.
1
URL: http://www.cyut.edu.tw/∼tclu
http://dx.doi.org/10.1016/j.sigpro.2017.07.025
0165-1684/© 2017 Elsevier B.V. All rights reserved.
T.-C. Lu / Signal Processing 142 (2018) 244–259 245
utilized the center-folding strategy to fold the secret message be- 2.1. NMI
fore concealing it in the stego-image to enhance the image quality
[13]. Nevertheless, the major drawback of this technique is that it Image interpolation is the process of enlarging the size of an
requires two images to extract the message. original image by inserting virtual pixels between two neighbor-
One technique to solve this problem is image interpolation, ing pixels [15]. Jung and Yoo used these pixels to embed a secret
which extends an extra pixel between two neighboring pixels to message [5]. In their scheme, the virtual pixel is computed by the
embed the secret message instead of generating another image. average value of the neighboring pixels. Fig. 1 shows a diagram of
Many researchers proposed interpolation-based RDH schemes to the scheme. Fig. 1(a) is an original image I. The virtual pixels are
increase the embedding capacity [2,11,12,14,15,16]. For example, computed to generate a cover image using the following equation:
Malik et al. proposed an image interpolation-based RDH scheme
⎧
using pixel value adjusting feature [14]. Lee et al. proposed a ⎪
⎪ I(i, j−1) + I(i, j+1)
data-hiding method based on reduplicated exploiting modifica- ⎪
⎪ , if i = 2h, j = 2w + 1,
⎪
⎪ 2
tion direction, image interpolation, and canny edge detection [11]. ⎪
⎪
⎪
Lu applied the center-folding strategy and interpolation technique ⎨ I
⎪
+I
with neighboring pixels (INP) to propose an adaptive interpolation- (i−1, j ) (i+1, j )
C(NMI
i, j ) = , if i = 2h + 1, j = 2w, (1)
based hiding scheme. In this scheme, the secret message is folded ⎪
⎪ 2
⎪
⎪
by the center value to reduce the value range and decrease the ⎪
⎪
⎪
⎪
image distortion [12]. Biswapati et al. used a weighted matrix to ⎪ I(i−1, j−1) + I(i−1, j ) + I(i, j−1) , otherwise.
⎪
compute the modulus summation to determine which pixel should ⎩ 2
be modified or not. The position value is added to the interpolated
pixel [2]. In Eq. (1), h and w are the height and width, respectively, of a
In Biswapati et al.’s scheme, an original image is divided into cover image, and (i, j) is the coordinate of the pixel. The interpo-
several parts with a size of 3 × 3. Then, Biswapati et al. used the in- lated image is called cover image C. Jung and Yoo concealed secret
terpolation method to generate a cover block size of 5 × 5 for each bits b in the virtual pixels C(NMI to generate the stego-pixel C(NMI ,
i, j ) i, j )
original part. Each cover block has 12 interpolated pixels, which
as shown in Fig. 1(c). When the receiver receives the stego-image
can be used to conceal 48 secret bits. To enhance the security
C’, the secret bits can be extracted from the stego-pixels C(NMI i, j )
,
of the scheme, Biswapati et al. updated the weighted matrix by
and the original image can be restored by reducing the stego-
using a shared secret key. Only authorized personnel who know
image. Fig. 2 shows how the original image is enlarged and how
the secret key can extract the correct message from the stego-
secret bits are hidden using Jung and Yoo’s scheme. Fig. 2(a) is
image.
the original image I = {84, 86, 88, 81}. Suppose that the secret bit
In Biswapati et al.’s scheme, the secret message is not directly
is b = (101110 )2 . The interpolated pixels are calculated by C(NMI1,2 )
=
concealed in the interpolated pixels. A weighted matrix is used to
compute the modulus sum and compare the sum with the secret (84+86
2
)
= 85, C(NMI
2,1 )
= (84+88
2
)
= 86, and C(NMI
2,2 )
= (84+85+86
3
)
=
message to make sure the sum is equal to the secret message. 85. The virtual pixels are shown in Fig. 2(b).
If the sum is not equal to the secret message, then the sum is Next, they divide the cover image into several block sizes of
subtracted from the secret message to obtain a modified position 2 × 2 to embed the secret bits. The first pixel I(1, 1) is the base pixel
value. The position value is then hided into the interpolated pixel used to compute the differences with other interpolated pixels. Let
to generate the stego-pixel. d1NMI , d2NMI , and d3NMI be the differences between I(1, 1) and three
Biswapati et al.’s scheme can hide numerous secret messages in virtual pixels C(NMI , C(NMI , and C(NMI . The equation is expressed as
1,2 ) 2,1 ) 2,2 )
the cover image. However, the image quality of Biswapati et al.’s follows:
scheme can still be improved. ⎧ NMI
The key factor that influences the image quality of Biswapati et ⎪d = C(NMI
1,2 ) − I(1,1 ) ,
⎨ 1
al.’s scheme is the modified position values. The value is usually
d2NMI = C(NMI
2,1 ) − I(1,1 ) , (2)
very large, thus creating a large image distortion between the in- ⎪
⎩
terpolated image and the stego-image. d3NMI = C(NMI
2,2 ) − I(1,1) .
This study reduces the value range of the position values
and re-encodes the values to reduce the distortion. The proposed The differences in Fig. 2(b) are d1NMI = |85 − 84| = 1,
scheme examines the probabilities for the position values and re- d2NMI = |86 − 84| = 2, and d3NMI = |85 − 84| = 1. The difference
encodes the value according to its occurrence number. For the po- dNMI is a key factor for judging the length of the secret bits LNMI ,
sition value with a high occurrence number, the proposed scheme which could be concealed in the interpolated pixel. The length is
encodes it with a small number close to zero. Conversely, the pro- computed by the following:
posed scheme encodes the rare value with a large number. Fre- ⎧ NMI
⎪L1 = log2 d1NMI ,
quent position value with a small code can effectively reduce the ⎨
distortion between the interpolated image and the stego-image. LNMI = log2 d2NMI , (3)
Furthermore, the proposed scheme uses different sizes of em- ⎪ 2
⎩ NMI
bedding blocks to control the hiding rate and image quality. L3 = log2 d3NMI .
2.2. INP
The maximum value of I(1, 1) , I(1, 2) , I(2, 1) , and I(2, 2) in Fig. 3(a) is
(4) 88. Therefore, the differences are d1INP = |84 − 88| = 4, d2INP = |85 −
88| = 3, d3INP = |84 − 88| = 4. The lengths of the differences are
Using the sample example, the original image
LINP = log2 (d1INP ) = log2 (4 ) = 2, LINP = log2 (3 ) = 1, and LINP =
is I = {84, 86, 88, 81}. The virtual pixels are C(INP = 1 2 2
1,2 ) log2 (4 ) = 2. Two secret bits b = (10)2 can be embedded in the
( I( 1 , 1 ) + I( 1 , 2 ) )
(I(1,1) + 2 )/2 = (84 + (84+86
2
)
)/2 = 84, C(INP
2,1 )
= first interpolated pixel C(INP 1,2 )
, as LINP
1
= 2. The transformed decimal
(I(1,1) +
( I( 1 , 1 ) + I( 2 , 1 ) )
= (84 + (84+88 )
)/2
)/2 = 85, and C(INP = secret symbol of b is β =(2)10 , and it is added to the interpolated
2,2 )
(84+85 )
2 2
pixel C(INP
1,2 )
to obtain the stego-pixel C(INP 1,2 )
= C(INP
1,2 )
+ β = 84 + 2 =
2 = 84. Fig. 3(a) shows the INP results. 86. The final stego-pixels are shown in Fig. 3.
Lee and Huang then computed the differences between the
maximum value of the block and the interpolated pixels to deter- 2.3 Lu’s (t, F1 ) scheme
mine the lengths of the secret bits. The maximum is calculated by
Fig. 15. Experimental results of the proposed scheme and the original scheme with Fig. 16. Experimental results of the proposed scheme and the original scheme with
different n and k for Lena. different n and k for Airplane.
Fig. 17. Stego-images of the proposed scheme and the original scheme.
T.-C. Lu / Signal Processing 142 (2018) 244–259 253
Fig. 18. Image quality comparisons among the proposed scheme and other methods.
254 T.-C. Lu / Signal Processing 142 (2018) 244–259
fore, the value 2 × (2 × k + 1) needs to be added to the value diff Continuing the example above, in Fig. 10(c), the stego-
to obtain the original di f f . Otherwise, di f f is equal to diff . The pixels are I = {84, 86, 88, 81}. The interpolated pixel is
equation is expressed as follows: C(reE
1,2 )
= 84 by using Eq. (4). The modulus value is V al =
! [(84 × 2 ) + (86 × 3 ) + (88 × 4 ) + (81 × 1 )] mod (2 × 8 + 1)= 9 by
di f f − 2 × (2 × k + 1 ), i f di f f > 2 × (2 × k + 1 ), using Eq. (10). The extracted difference is di f f = |C(reE − C(reE |=
1,2 ) 1,2 )
di f f = di f f + 2 × (2 × k + 1 ), i f di f f < 0,
di f f , otherwise. 85 − 84 = 1. As 0 < di f f < 2 × (2 × k + 1), the value di f f is
equal to diff , where di f f = 1. According to the re-encoding map
(18) shown in Fig. 11, the corresponding value of di f f = 1 is di f f = 8.
The re-encoding map is then used to find the corresponding The secret symbol is computed by β = (8 + 9 )% (2 × 8 + 1) = 0.
value diff of di f f . The proposed scheme computes the secret sym- The length of the secret bits is L = log2 (2 × 8 + 1) = 4. There-
bol using the following equation: fore, the secret symbol is transformed to the binary bit string
(0 0 0 0)2 with a length of 4 to obtain the original secret
β = (di f f + V al )% (2 × k + 1). (19) bits.
Finally, the proposed scheme transforms the secret symbol β
into a binary string to obtain the original secret bits.
T.-C. Lu / Signal Processing 142 (2018) 244–259 255
Fig. 19. Re-encoding map among diff, H, H , and di f f of Lena with n = 3 and k = 4.
Fig. 20. Comparison results of NMI, INP, CRS, Lu, and the proposed method.
256 T.-C. Lu / Signal Processing 142 (2018) 244–259
Table 1 Lena image. Furthermore, the color of the image is the closest to
Image quality and hiding capacity comparisons with dif-
the original one.
ferent n and k.
Fig. 19 shows the re-encoding map example among diff, H,
n k Original reEncode Capacity bpp H , and di f f of Lena with n = 3 and k = 4. The total numbers of
3 4 37.23 43.31 433,500 1.65 the most frequent occurrence differences di f f = 1 and di f f = 4
4 4 35.90 41.97 589,824 2.25 are 18,444 and 18,009, respectively. The original scheme directly
5 4 35.44 41.51 156,060 0.60 adds the values to the interpolated pixels. The distortions made
6 4 35.19 41.26 108,375 0.41
by the differences will be di f f × di f f × H (di f f ) = 1 × 1 × 18444
7 4 35.03 41.10 79,935 0.30
8 4 34.93 41.00 61,440 0.23 of di f f = 1, and 4 × 4 × 18009 = 288144 of di f f = 4. The total dis-
9 4 35.00 41.07 47,040 0.18 tortion of the original scheme is 3224467, and the MSE is com-
10 4 34.86 40.93 39,015 0.15 puted as (3224467
512×512 )
= 12.3.
3 8 31.82 37.38 578,0 0 0 2.20
4 8 30.48 36.03 786,432 3.00
Considering the same image, the re-Encode scheme sorts H
5 8 30.03 35.58 208,080 0.79 in descending order to obtain H and the re-encoded code di f f .
6 8 29.78 35.34 144,500 0.55 Hence, di f f = 1 and di f f = 4 are re-encoded to 0 and 1. Further-
7 8 29.62 35.18 106,580 0.41 more, the codes are mapped to obtain the mapping codes 0 and
8 8 29.51 35.08 81,920 0.31
− 1. The distortions made by the differences are 0 and 18,090. The
9 8 29.59 35.15 62,720 0.24
10 8 29.45 35.01 52,020 0.20 total distortion of the re-Encoded scheme is 790,893, and MSE is
3 16 25.20 31.38 722,500 2.76 3.017. We can see that the distortion is greatly decreased such that
4 16 23.87 30.04 983,040 3.75 the image quality of the stego-image is increased effectively.
does not mean that a large block size can obtain better results. Table 2 shows the comparison between the proposed method
From Table 1, we can see that the hiding capacity is decreased to with n = 4 and k = 8 and the four state-of-the-art methods in terms
156,060 bits, and image quality is reduced to 35.44 and 41.51 dbs. of PSNR and bpp. The PSNR of the proposed scheme is 4 db better
These results are the same as when the hiding bit is set to k = 8. than those of the other three methods on the other images and
Therefore, the parameter n set to 3 or 4 can obtain better results. 5 db better than that of Lu’s scheme. However, the PSNR is 2.75 db
Furthermore, the study increased the hiding bit to 16, k = 16. less than that of NMI on Tiffany.
Experimental results show that the hiding capacity can increase The comparison figures with different hiding payloads are
to 722,500 and 983,040 bits of n = 3 and n = 4, respectively. How- shown in Fig. 20. The image quality and the hiding payload of the
ever, the image qualities of the stego-images are lower than 35 db, proposed scheme with n = 4 and k = 8 are better than those of the
which may be perceived by the human eye. Hence, the suggested other methods.
hiding bit is set to k = 4 or k = 8. Table 3 shows the execution time comparisons of NMI, INP, CRS,
Figs. 15 and 16 show more results with different n and k. The Lu, and the proposed method. The proposed scheme statistics the
proposed scheme (called reEncode) with n = 3 and k = 4, can ob- histogram of the differences and ranking the values. Hence, the ex-
tain the highest image quality. However, the hiding payload of the ecution time (approximately 1.14 s) is worse than that of the other
proposed scheme with n = 3 and k = 4 is less than that of the pro- methods. However, the total execution time is still acceptable.
posed scheme with n = 4 and k = 4. The parameters set to n = 4 Table 4 shows the comparison between Biswapati’s scheme and
and k = 8 can obtain the highest hiding payload. Therefore, the pro- the proposed scheme with n = 4 and k = 8, and n = 4 and k = 4, re-
posed scheme can obtain improved image quality when the pa- spectively. In the high hiding capacity, the PSNR value of the pro-
rameters are set to n = 3 and k = 4. The parameters can be set to posed scheme is higher than that of Biswapati’s scheme by approx-
n = 4 and k = 8 to obtain a high hiding payload. imately 0.23 db. In the low hiding capacity, the PSNR value of the
The image quality and the hiding payload of the proposed proposed scheme is higher than that of Biswapati’s scheme by ap-
scheme are higher than those of the original scheme, thus indi- proximately 4.73 db.
cating that the re-encoding strategy is workable.
The cover images and the stego-image using the original 4.3. Steganalysis
scheme and the proposed scheme are shown in Fig. 17. The figures
indicate that the stego-images are similar to the cover images. To prove the security of the proposed scheme, steganalysis tests
Fig. 18 shows the image quality comparisons among the pro- such as histogram steganalysis, RS steganalysis, primary sets, Chi
posed scheme and the other methods. Fig. 18(a) is the original im- square, sample pairs, RS analysis, and fusion detection are con-
age Lena. The columns Face and Eye are partial magnification of ducted.
Lena’s face and eye. Fig. 18(b) shows the stego-image of CRS. The Histogram steganalysis is used to compare the shapes of the
eye part of Fig. 18(b) has a large amount of noise, and edges have histograms of the cover image and the stego-image to determine
be severely modified. A considerable amount of salt-and-pepper if a message has been concealed in the image. Figs. 21(a) and (b)
appeared in the edges. show the histogram comparison between Lena and Mandrill, re-
Fig. 18(c) shows the stego-image of NMI. The image quality of spectively. The curve starting with the symbol “∗ ” is the histogram
Fig. 18(c) is worse than that of Fig. 18(b). The image contains nu- of the stego-image. In the figure, the shape of the stego-image is
merous redundant white lines, and the eye becomes very fuzzy. almost the same as that of the cover image.
The same situation is observed in Fig. 18(d). RS steganalysis is also conducted. Fridrich et al. [4] proposed RS
Figs. 18(e) and (f) show the stego-images obtained by using Lu’s steganalysis in 2001. In their scheme, pixels are categorized into
scheme and the original scheme without re-encoding. Both images different groups by using a judgment function and a flipping func-
do not have the salt-and-pepper noise and redundant white lines. tion. The judgment function determines the smoothness or regu-
However, the color of the images is lighter than that of the original larity of each group. The flipping function defines the groups into
image. three different categories: regular (R), singular (S), and unusable
Fig. 18(g) shows the stego-image obtained by using the pro- (U). The group percentages of regular, singular, and unusable with
posed scheme. The image is the most similar image to the original mask M = [1 0 0 1] and -M = [− 1 0 0 − 1] are indicated by R_M_G,
258 T.-C. Lu / Signal Processing 142 (2018) 244–259
Table 2
PSNR and bpp comparison of NMI, INP, CRS, Lu, and the proposed method for stego-image and cover image.
Airplane 33.05 1.05 32.64 1.19 31.54 1.51 30.74 2.83 30.48 3.00 36.03 3.00
Tiffany 37.77 0.93 37.15 1.09 36.00 1.37 30.93 2.83 30.75 3.00 35.02 3.00
Lake 32.48 1.10 31.76 1.25 30.75 1.60 30.74 2.83 30.48 3.00 36.03 3.00
Lena 34.89 1.10 34.32 1.25 33.19 1.57 30.74 2.83 30.48 3.00 36.03 3.00
Mandrill 32.40 1.10 31.65 1.25 31.36 1.60 30.74 2.83 30.48 3.00 35.99 3.00
Pepper 34.27 1.10 33.72 1.25 33.39 1.53 30.31 2.83 30.43 3.00 34.85 3.00
Table 3 U_FM_G have the same situations. Therefore, the proposed scheme
Execution time comparisons of NMI, INP,
cannot be detected by the RS steganalysis.
CRS, Lu, and the proposed method.
The experimental results of the primary sets, chi square, sample
Method Execution time (s) pairs, RS analysis, and fusion detection [3] are shown in Table 5. All
Proposed scheme 3.592 experimental numbers are small, thus indicating that the proposed
Original 2.349 scheme is secure and robust.
Lu 3.025
CRS 2.854
INP 2.100
NMI 1.900 5. Conclusion
Table 5
Steganalysis results of StegExpose.
File name n k Primary sets Chi square Sample pairs RS analysis Fusion (mean)
Experimental results show that the embedding payload of the [5] K.H. Jung, K.Y. Yoo, Data hiding method using image interpolation, Comput.
proposed method with n = 4 and k = 8 is 4 db better than those of Stand. Interfaces 31 (2009) 465–470.
[6] C.F. Lee, Y.L. Huang, An efficient image interpolation increasing payload in re-
INP, NMI, CRS, and more than 5 db better than that of Lu’s scheme versible data hiding, Expert Syst. Appl. 39 (2012) 6712–6719.
for a similar image quality. The image quality of the proposed [7] J. Li, X. Li, B. Yang, Reversible data hiding scheme for color image based on
method with n = 3 and k = 4 is 4.73 db better than that of Biswa- prediction-error expansion and cross-channel correlation, Signal Process. 93
(2013) 2748–2758.
pati’s scheme for a similar hiding payload. The steganalysis results [8] Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data hiding, IEEE Trans. Circuits Syst.
show that the proposed scheme is secure and robust against many Video Technol. 16 (2006) 354–362.
attacks. [9] M.W. Tang, J. Hu, W. Song, A high-capacity image steganography using multi-
-layer embedding, Optik 125 (2014) 3972–3976.
[10] J. Tian, Reversible data hiding using a difference expansion, IEEE Trans. Circuits
Acknowledgments Syst. Video Technol. 13 (2003) 890–896.
[11] C.F. Lee, C.Y. Weng, K.C. Chen, An efficient reversible data hiding with redu-
plicated exploiting modification direction using image interpolation and edge
This study was financially supported by a research grant from
detection, Multimedia Tools Appl. 76 (2017) 9993–10016.
Taiwan’s Ministry of Science and Technology (MOST 105-2221-E- [12] T.C. Lu, Adaptive (k, F1) interpolation-based hiding scheme using center folding
324-020). strategy, Multimedia Tools Appl. 76 (2017) 1827–1855.
[13] T.C. Lu, J.H. Wu, C.C. Huang, Dual-image based reversible data hiding method
References using center folding strategy, Signal Process. 115 (2015) 195–213.
[14] A. Malik, G. Sikka, H.K. Verma, An image interpolation based reversible data
hiding scheme using pixel value adjusting feature, Multimedia Tools Appl. 76
[1] A.M. Alattar, Reversible watermark using the difference expansion of a gener- (2017) 13025–13046.
alized integer transform, IEEE Trans. Image Process. 13 (2014) 1147–1156. [15] T. Wittman, Mathematical techniques for image interpolation. (2005). http://
[2] J. Biswapati, G. Debasis, M.S. Kumar, Weighted matrix based reversible data www.math.ucla.edu/∼wittman/thesis/Poral2.pdf. (accessed 15.04.19).
hiding scheme using image interpolation, Comput. Intell. Data Mining 2 (2016) [16] C.N. Yang, S.C. Hsua, C. Kimb, Improving stego image quality in image interpo-
239–248. lation based data hiding, Comput. Stand. Interfaces. 50 (2017) 209–215.
[3] B. Boehm, StegExpose - A steganalysis tool for detecting lsb steganography in [17] C. Qin, C.C. Chang, T.J. Hsu, Reversible data hiding scheme based on exploit-
images, 2014 (accessed 17.07.10). http://arxiv.org/abs/1410.6656. ing modification direction with two steganographic images, Multimedia Tools
[4] J. Fridrich, M. Golijan, R. Du, Reliable detection of LSB steganography in Appl. 74 (2015) 5861–5872.
grayscale and color images, in: Proceedings of ACM Workshop on Multimedia
and Security, 2001, pp. 27–30.