Data Hiding Based On A Two-Layer Turtle Shell Matr
Data Hiding Based On A Two-Layer Turtle Shell Matr
Abstract: Data hiding is a technology that embeds data into a cover carrier in an imperceptible way
while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one
important branch of computer science and has drawn attention of scholars in the last decade. Turtle
shell-based (TSB) schemes have become popular in recent years due to their higher embedding
capacity (EC) and better visual quality of the stego-image than most of the none magic matrices
based (MMB) schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB) scheme
for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of
the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB
scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per
pixel (bpp). The experimental results reveal that under the condition of the same visual quality, the
EC of the proposed scheme outperforms state-of-the-art data hiding schemes.
Keywords: data hiding; turtle shell; two-layer; enhanced visual quality; improved hiding capacity
1. Introduction
Data hiding is a technology that can imperceptibly embed secret data into the carrier (e.g., text,
sound, images, videos) to obtain the stego-carrier. After being transmitted in the communication
channel, the receiver can extract the secret data accurately from the stego-carrier using the extraction
algorithm. Due to the imperceptibility characteristic, stego-carriers can avoid attracting malicious
attackers during transmission, which in some terms is superior to cryptographic encryption, another
communications security technology. In practical applications, data hiding is widely used in the
fields of medical images, copyright protection, military secrets, forensic evidence and anonymous
communications [1,2]. Meanwhile, with the rapid development and the wide use of digital images,
data hiding in images has attracted increasing attention from researchers in recent decades [3]. In
addition, some researchers further studied this field and proposed several reversible data hiding
methods in which the cover image can be recovered losslessly after the secret data was extracted [4–
6]. The performance of data hiding technology is measured mainly by embedding capacity (EC) and
the image quality after embedding.
The existing data hiding techniques are conducted mainly in three domains, i.e., the frequency
domain, the compression domain, and the spatial domain. In the frequency domain, the cover image
is first transformed to the discrete cosine transform (DCT) coefficients [4,7] or the discrete wavelet
transformation (DWT) coefficients [8,9], in which the secret data is embedded. Since only a small
quantity of the coefficients can be used for embedding, the embedding capacity cannot meet the
Symmetry 2018, 10, 47; doi:10.3390/sym10020047 www.mdpi.com/journal/symmetry
Symmetry 2018, 10, 47 2 of 14
requirements for most of the applications in practicality. In the compression domain, the cover
image is first compressed to vacate space for embedding. Several researchers have proposed data
hiding schemes based on vector quantization (VQ) compression [10–13], which can achieve larger
embedding capacities; however, this capacity is at the expense of the distortion of the cover image.
In terms of the spatial domain, schemes can be roughly categorized into three types: the least
significant bit (LSB) substitution [14–16], the exploiting modification direction (EMD) [17–19], and
the magic matrix based (MMB) schemes [20–26]. Among them, LSB is the most commonly used
scheme and was first proposed by Bender et al. in 1996 [3]. The original LSB scheme directly replaces
the LSBs of each pixel with the secret bits. Later on, Wang et al. [14] proposed an optimal LSB
substitution to improve the image quality and developed a genetic algorithm to solve the huge
computation problem. The algorithm of LSB replacement is quite simple; however, the hiding data
can be easily detected [16]. In order to avoid being attacked by malicious users, Mielikainen [15]
improved the LSB matching method and pairwisely embedded data by modifying their parity. The
embedding capacities of [14,15] are both 1 bit per pixel (bpp). Zhang and Wang [17] fully exploited
the directions of modification so as to embed one secret (2n 1) -ary digit into a vector with n
pixels by changing at most one LSB of one pixel. The method, called EMD, can achieve a large
embedding capacity with less distortion. In 2010, Kim et al. [18] proposed two methods called
2-EMD and EMD-2, which can achieve a larger capacity than the original EMD method presented in
[13] with similar distortion. Particularly in EMD-2, Kim et al., embedded one (2w 1) -ary digit into
a vector of n pixels by flipping at most LSBs of 2 pixels, where w 4 when n 2 ,
w 8 5(n 3) when n 2 . Moreover, the two methods can be generalized to n-EMD and EMD-n,
where n 1 . Later on, Liu et al. [19] further improved the embedding capacity by combining the
EMD and the Chinese remainder theorem.
Unlike the aforementioned methods, several novel schemes based on MMB have been proposed in
the past few years. In 2008, Chang et al. [20] proposed a novel data hiding scheme using Sudoku, which
considers a pixel pair as the coordinate of a Sudoku matrix to specify the value to embed one 9-ary digit
into each pixel pair. The embedding capacity is 1.5 bpp. Hong et al. [21] improved the method in [20] by
searching embedding positions based on the nearest Euclidean distance to achieve higher image quality.
To enhance the security, a Sudoku-based wet paper hiding scheme was presented by Wang et al. [22]. In
2014, Chang et al. [23] put forward a novel TSB scheme, in which a secret 8-ary digit is embedded into
each pixel pair with the guidance of the turtle shell. The scheme in [23] can maintain a large embedding
capacity (1.5 bpp) with less distortion. In 2016, Liu et al. [24] produced an extra location table to achieve a
larger embedding capacity of 2 bpp. Then, in 2017, for better image quality and the security of the hidden
data, Jim et al. [25] proposed a new method using particle swarm optimization to minimize the
distortion. In the same year, Liu et al. [26] extended the turtle shell matrix to different matrix models to
meet diverse requirements of embedding capacity and image quality. The scheme in [26] can maintain a
good image quality with an average peak signal-to-noise ratio (PSNR) of 41.87 when the embedding
capacity is high, up to 2.5 bpp.
In this paper, we introduce an extra attribute of a 4-ary digit, namely type, to each element of
the turtle shell matrix, and then proposed a two-layer turtle shell matrix based (TTSMB) scheme. The
first layer is a type of 4-ary digit represented by two bits, and the second layer is the value of an 8-ary
digit represented by three bits. Similar to TSB schemes, each pixel pair, considered the coordinate of
the turtle shell matrix, can specify only one element in matrix. Therefore, for each pixel pair, five bits
can be embedded by the two-layer turtle shell matrix, and the embedding capacity can reach 2.5 bpp.
Meanwhile, the experimental results proved that the stego-image kept a high visual quality.
In Section 2, the related work of the original TSB scheme proposed by Chang et al. is
introduced. Section 3 gives a detailed depiction of the proposed scheme, followed by an analysis of
experimental results in Section 4. Finally, conclusions are made in Section 5.
contains eight digits from 0 to 7. Based on the characteristics, a pixel pair, which is considered the
coordinate of the matrix, can specify an 8-ary digit. The following section gives a brief review of
Chang et al.’s scheme.
Step 1: Convert the secret binary stream S into a sequence of octal digits SO s1 , s2 , , sn , where
n is the number of octal digits.
Step 2: Divide the cover image I into non-overlapping pixel pairs pk , pk 1 , where
k 1,3, , W H 1 . Consider pk , pk 1 as the coordinate of matrix M to specify the value
m pk , pk 1 .
Step 3: Embed one octal digit st 1 t n into each pixel pair. The algorithm can be categorized
into two cases.
Symmetry 2018, 10, 47 4 of 14
Case 1: m pk , pk 1 st , which means that the current pixel pair exactly corresponds to the
secret octal digit; therefore, do nothing and go to Step 4.
Case 2: m pk , pk 1 st , which means the current pixel pair cannot correspond to the secret
octal digit; therefore, find the closest m pr , pc that equals to st , and then replace pk , pk 1 with
pr , pc in the cover image to embed the octal digit st . Find the closest m pr , pc according to
the following rules:
Rule 1: If m pk , pk 1 is a back digit, then find m pr , pc in the current turtle shell.
Rule 2: If m pk , pk 1 is an edge digit, then find the closest m pr , pc in the involved turtle
shells.
Rule 3: If m pk , pk 1 is not included in any turtle shell, then find the closest m pr , pc in the
3 3 sub-block where m pk , pk 1 is located.
Step 4: Repeat Step 3 to embed the next octal digit into the follow-up pixel pair until all the secret
data is embedded.
Finally, the stego-image I is obtained.
At the procedure of the data extraction, with the construction information, the receiver
constructs the turtle shell matrix M m i, j . According to stego-image I and the turtle
256256
shell matrix, the secret data can be easily extracted by mapping the stego pixel pairs to the elements
of the turtle shell matrix, the values of which are exactly the secret data.
3. Proposed Scheme
Observing the turtle shell matrix M m i, j 256256 , we can say that, to some extent, it is
composed with turtle shells sized 127 127 . In the proposed scheme, we assign a 4-ary digit,
referred to as type, to each turtle shell, as shown in Figure 3. For ease of description, the type matrix
of the turtle shell is denoted as T t x, y 127127 . The type matrix is constructed following the rules:
first, the values of type in the same row change according to the gradient ascent/descent with a
magnitude of “1”; second, the values of the elements in the same column change according to the
gradient ascent/descent with an alternate magnitude of “2” and “1”. Figure 3 shows an example of a
type matrix for turtle shell.
Case 1: No involved turtle shells, e.g., m 0, 0 , and the type of such element is set as 4, e.g.,
tm 0,0 4 .
Case 2: Only one turtle shell involved, e.g., m 1,1 . The type of such element is set as the type
of the turtle shell, e.g., tm 1,1 3 .
Case 3: Two turtle shells involved, e.g., m 1,3 . Then, the type of such element is the result of
an operation exclusive of binary representations of the corresponding types of two turtle shells, e.g.,
tm 1,3 1 3 2 .
Case 4: Three turtle shells involved, e.g., m 2, 2 . The type of such element is the result of an
operation exclusive of binary representations of the corresponding types of three turtle shells, e.g.,
tm (2, 2) 1 3 0 2 .
According to the calculation algorithm, each m i, j 0,1, ,7 in the turtle shell matrix M is
assigned to a corresponding type tm i, j 0,1, 2,3 . In other words, a two-layer turtle shell matrix is
generated. The first layer is the value matrix of elements, viz., M m i, j 256256 . The second layer is
the type matrix of elements, viz., Tm tm i, j 256256 . Figure 5 shows part of a two-layer turtle shell
matrix. Digits in black are the values of elements, and digits in red are the values of a corresponding
type. The statistical results confirm that all combinations of type and value, in other words, the 8* 4
mappings ( 0,1, , 7 {0,1, 2,3} ), can be found in any parallelogram district consisting of nine turtle
shells. Turtle shells in blue in Figure 5 show an example. In this case, we can exploit the type matrix
Tm tm i, j 256256 as well as M m i, j 256256 to hide data. Consequently, a TTSMB data hiding
scheme is proposed in this paper.
On the data hider side, he/she constructs a two-layer turtle shell matrix, and then embeds every
five bits into each pixel pair. As in the TSB scheme, the construction information is shared with the
receiver. With the construction information, the receiver reconstructs the two-layer matrix and extracts
the secret data from the stego-image using the matrix. The difference is that the construction
Symmetry 2018, 10, 47 7 of 14
information in TTSMB includes extra information of the second layer. Since the construction of the
second layer matrix (i.e., the type matrix) can be calculated according to the above-mentioned
algorithm, the construction information of the second layer includes the value with the coordinate (0,0)
in T t x, y , the construction rules of T , and the algorithm for generating type matrix Tm .
127127
The procedures for data embedding and extraction are described in detail in the following sections.
Step 1: Reconstruct the two-layer turtle shell matrix ( M m i, j 256256 and Tm tm i, j 256256 )
using the shared construction information in the same way as described in the data embedding
procedure.
Symmetry 2018, 10, 47 9 of 14
Step 2: Divide the stego-image I into non-overlapping pixel pairs pk , pk 1 , where
k 1,3, , W H 1 .
Step 3: Extract the hidden secret data by mapping each pixel pair pk , pk 1 to the two-layer turtle
shell matrix ( M and Tm ), that is tm ( pk , pk 1 ) and m pk , pk 1 , which are in 4-ary and octal format,
respectively.
Step 4: Convert the values of these two digits (i.e., tm ( pk , pk 1 ) and m pk , pk 1 ) into binary bits,
and then combine them to form the sub-stream of secret data.
Step 5: Finally, combine all the sub-streams to form the secret binary stream S when all the
sub-streams are extracted.
Table 2. Example of data embedding using the two-layer turtle shell matrix in Figure 6.
4. Experimental Results
Experiments were conducted to verify the performance of the proposed scheme. Six test
grayscale images, ‘Lena’, ‘Airplane’, ‘Boat’, ‘Baboon’, ‘Peppers’, and ‘Sailboat’, were used from the
University of Southern California-Signal and Image Processing Institute (USC-SIPI) image database
[27]. The sizes of the six test images were 512 512 shown in Figure 8. The binary secret stream S
was randomly generated. In addition, Figure 9a–f are the corresponding stego-images with
maximum embedding capacity (EC) of 2.5 bpp. The results show that, for all the test images, the
stego-images remain high quality with a PSNR not lower than 47 dB. For a cover image sized
W H , EC and PSNR can be calculated by Equations (1) and (2), respectively. The higher PSNR
indicates the better image quality:
NS
EC bpp , (1)
W H
Symmetry 2018, 10, 47 10 of 14
2552
PSNR 10log10 , (2)
MSE
where N s is the number of embedding bits, and the mean square error (MSE) is defined as Equation
(3):
W H
I i, j I i, j
1 2
MSE (3)
W H i 1 j 1
.
Herein, I i, j and I i, j are the original pixel values and the stego pixel values,
respectively.
Figure 8. Six original cover images: (a) Lena; (b) Peppers; (c) Baboon; (d) Sailboat; (e) Airplane; (f) Boat.
Figure 9. Six stego-images with maximum embedding capacity of 2.5 bpp. (a) Stego Lena with
PSNR = 47.13; (b) Stego Peppers with PSNR = 47.13; (c) Stego Baboon with PSNR = 47.09; (d) Stego
Sailboat with PSNR = 47.12; (e) Stego Airplane with PSNR = 47.11; (f) Stego Boat with PSNR = 47.15.
Comparisons with four previous TSB schemes are made in Table 3. It can be observed that the
proposed scheme obviously outperforms the other four in terms of the embedding capacity and
image quality. To be more detailed, the embedding capacity of the proposed scheme (i.e., 2.5 bpp) is
much higher than that of [23] (i.e., 1.5 bpp), just with a slight decrease of PSNR. The image quality of
Symmetry 2018, 10, 47 11 of 14
the proposed scheme is better than that of [24,25], even with a higher embedding capacity. That is,
with an embedding capacity of 2 bpp, the average PSNRs are 45.55 dB and 45.57 dB for [24,25],
respectively. With an embedding capacity of 2.5 bpp, the average PSNR is 47.12 dB in the proposed
scheme. Though [26] can achieve a high embedding capacity as can the proposed scheme, viz. 2.5
bpp, there is a remarkable improvement of the image quality in the proposed scheme, with an
average PSNR of 47.12 dB versus 41.87 dB.
From Table 3, we can also find that, for all the five TSB based schemes including the proposed
scheme, in the condition of a certain EC, the PSNRs of all the test images keep steady on the whole.
The reason for the phenomenon is that the changing magnitude of pixels during the embedding
procedure is determined by the constructed turtle shell matrix and the embedding algorithm, in
other words, the image quality of stego-image is irrelevant to the cover image. Therefore, we can
draw a remark: PSNR of the proposed scheme always keeps around 47.12 dB and higher than the
other four TSB schemes, regardless of the content of test images.
Comparisons between other non-TSB schemes are made in this paper as well. As shown in Table
4, the embedding capacities of other non-TSB schemes are no more than 1.6 bpp (i.e., 1 bpp for EMD
[17], 1.37 bpp for EMD-2 [18], 1.5 bpp for [20], 1.585 bpp for [21]), which is much lower than that of the
proposed scheme (i.e., 2.5 bpp). Moreover, the image quality of the proposed scheme outperforms that
of [20,21], even with the larger embedding capacity (i.e., 1.6 bpp for the proposed scheme vs. 1.5 bpp
and 1.585 bpp for [20,21], respectively). From both Tables 3 and 4, we can also infer that TSB schemes
perform better than EMB- and Sudoku-based schemes in terms of image quality and embedding
capacity, which boils down to the property that eight digits (0–7) can be found within a turtle shell,
result in the maximum changing magnitude is “2” during the embedding procedure.
Table 3. Comparison of PSNR (dB) and EC (bpp) with four other TSB schemes.
Table 4. Comparison of PSNR (dB) and EC (bpp) between other non-TSB schemes.
In addition to PSNR, structural similarity Index (SSIM) is also used as image quality evaluation
criteria. PSNR measures the difference between two images based on the estimated absolute errors,
and SSIM considers image perceptual degradation in structural information. The SSIM index is
calculated on the blocks of an image. Assuming there are two blocks, x and y , of common size,
N N , the SSIM index can be calculated according to Equation (4), and 0 SSIM 1 . The larger the
SSIM index is, the higher the similarity is. If SSIM 1 , then the two images are the same.
Symmetry 2018, 10, 47 12 of 14
(2 x y c1 )(2 xy c2 )
SSIM x, y , (4)
( x2 y2 c1 )( x2 2y c2 )
with:
5. Conclusions
Observing that turtle shell matrix M m i, j 256256 is composed with turtle shells sized
127 127 , a type of 4-ary digit is assigned to each turtle shell. To go further, an extra attribute, type,
is assigned to each element of the turtle shell matrix by conducting an exclusive operation on all
involved turtle shell types. Therefore, a two-layer turtle shell-based scheme is proposed in this
paper. The first layer is a 4-ary digit type represented by 2 bits, the second layer is the value of the
8-ary digit represented by three bits. The statistical results show that 4 8 combination cases can
be found in any parallelogram district consisting of nine turtle shells. As a result, for each pixel pair,
five bits can be embedded. The experimental results verify that the proposed scheme outperforms
the state-of-the-art data hiding schemes in terms of embedding capacity while maintaining a high
image quality.
Acknowledgments: This work is supported by the Natural Science Foundation of China under Grant 61503316,
the Natural Science Foundation of Fujian Province under Grant 2016J01326,and Open Fund of Engineering
Research Center for Software Testing and Evaluation of Fujian Province.
Author Contributions: Chin-Chen Chang conceived and designed the experiments; Xiao-Zhu Xie performed
the experiments and wrote the paper; and Chia-Chen Lin analyzed the data.
Conflicts of Interest: The authors declare no conflict of interest. Authors must identify and declare any
personal circumstances or interest that may be perceived as inappropriately influencing the representation or
interpretation of reported research results. The founding sponsors had no role in the design of the study; in the
collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the
results.
Symmetry 2018, 10, 47 13 of 14
References
1. Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. Information hiding—A Survey. Proc. IEEE 1999, 87, 1062–1078,
doi:10.1109/5.771065.
2. Sreejith, R.; Senthil, S. A novel tree based method for data hiding and integrity in medical images. In
Proceedings of the International Conference on Electrical, Instrumentation and Communication
Engineering, Karur, India, 21–28 April 2017; doi:10.1109/ICEICE.2017.8191946.
3. Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. Techniques for data hiding. IBM Syst. J. 1996, 35, 313–336,
doi:10.1147/sj.353.0313.
4. Chang, C.C.; Lin, C.C.; Tseng, C.S.; Tai, W.L. Reversible hiding in DCT-based compressed images. Inf. Sci.
2007, 177, 2768–2786, doi:10.1016/j.ins.2007.02.019.
5. Lu, T.C.; Leng, H.S. Reversible dual-image-based hiding scheme using block folding technique. Symmetry
2017, 9, 223, doi:10.3390/sym9100223.
6. Liu, W.L.; Leng, H.S.; Huang, C.K.; Chen, D.C. A block-based division reversible data hiding method in
encrypted images. Symmetry 2017, 9, 308, doi:10.3390/sym9120308.
7. Lin, C.C.; Shiu, P.F. High capacity data hiding scheme for DCT-based images. J. Inf. Hiding Multimedia
Signal Process. 2010, 1, 220–240.
8. Abdelwahab, A.A.; Hassan, L.A. A discrete wavelet transform based technique for image data hiding. In
Proceedings of the 25th National Radio Science Conference, Tanta, Egypt, 18–20 March 2008; pp. 1–9,
doi:10.1109/NRSC.2008.4542319.
9. Liu, H.; Liu, J.; Huang, J.; Huang, D.; Shi, Y.Q. A robust DWT-based blind data hiding algorithm. In
Proceedings of the IEEE International Symposium on Circuits and Systems, Phoenix-Scottsdale, AZ, USA,
26–29 May 2002; Volume 2, pp. 672–675, doi:10.1109/ISCAS.2002.1011442.
10. Chang, C.C.; Wu, W.C. Hiding secret data adaptively in vector quantization index tables. IEE Proc. Vis.
Image Signal Process. 2006, 153, 589–597, doi:10.1049/ip-vis:20050153.
11. Hu, Y.C. High capacity image hiding scheme based on vector quantization. Pattern Recognit. 2006, 39,
1715–1724, doi:10.1016/j.patcog.2006.02.005.
12. Chang, C.C.; Kieu, T.D.; Wu, W.C. A loss-less data embedding technique by joint neighboring coding.
Pattern Recognit. 2009, 42, 1597–1603, doi:10.1016/j.patcog.2008.11.040.
13. Pizzolante, R.; Carpentieri, B.; Castiglione, A.; De Maio, G. The AVQ algorithm: Watermarking and
compression performances. In Proceedings of the International Conference on Intelligent Networking and
Collaborative Systems, Fukuoka, Japan, 30 November–2 December 2011; pp. 698–702,
doi:10.1109/INCoS.2011.153.
14. Wang, R.Z.; Lin, C.F.; Lin, J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern
Recognit. 2001, 34, 671–683.
15. Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett. 2006, 13, 285–287,
doi:10.1109/LSP.2006.870357.
16. Ker, A.D. Improved detection of LSB steganography in grayscale images. Proc. Inf. Hiding Workshop 2004,
3200, 97–115, doi:10.1007/978-3-540-30114-1_8.
17. Zhang, X.; Wang, S. Efficient steganographic embedding by exploiting modification direction. IEEE
Commun. Lett. 2006, 10, 781–783, doi:10.1109/LCOMM.2006.060863.
18. Kim, H.J.; Kim, C.; Choi, Y. Improved modification direction methods. Comput. Math. Appl. 2010, 60, 319–
325, doi:10.1016/j.camwa.2010.01.006.
19. Liu, Y.; Chang, C.C.; Huang, P.C.; Hsu, C.Y. Efficient information hiding based on theory of numbers.
Symmetry 2018, 10, 19, doi:10.3390/sym10010019.
20. Chang, C.C.; Chou, Y.C.; Kieu, T.D. An information hiding scheme using Sudoku. In Proceedings of the
Third International Conference on Innovative Computing Information and Control, Dalian, China, 18–20
June 2008; pp. 17–22, doi:10.1109/ICICIC.2008.149.
21. Hong, W.; Chen, T.S.; Shiu, C.W. A minimal Euclidean distance searching technique for Sudoku
steganography. In Proceedings of the International Symposium on Information Science and Engineering,
Shanghai, China, 20–22 December 2008; pp. 515–518, doi:10.1109/ISISE.2008.153.
22. Wang, Z.H.; Chang, C.C.; Li, M.C. A Sudoku based wet paper hiding scheme. Int. J. Smart Home 2009, 3, 1–11.
23. Chang, C.C.; Liu, Y.; Nguyen, T.S. A novel turtle shell based scheme for data hiding. In Proceedings of the
2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
(IIH-MSP), Kitakyushu, Japan, 27–29 August 2014; pp. 89–93, doi:10.1109/IIH-MSP.2014.29.
Symmetry 2018, 10, 47 14 of 14
24. Liu, Y.; Chang, C.C.; Nguyen, T.S. High capacity turtle shell-based data hiding. IET Image Process. 2016, 10,
130–137, doi:10.1049/iet-ipr.2014.1015.
25. Jin, Q.; Li, Z.; Chang, C.C. Minimizing turtle-shell matrix based stego image distortion using particle
swarm optimization. Int. J. Netw. Secur. 2017, 19, 154–162, doi:10.6633/IJNS.201701.19.16.
26. Liu, L.; Chang, C.C.; Wang, A. Data hiding based on extended turtle shell matrix construction method.
Multimedia Tools Appl. 2017, 76, 12233–12250, doi:10.1007/s11042-016-3624-7.
27. USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 3 May 2017).
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).