{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:43:40Z","timestamp":1760197420129,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T00:00:00Z","timestamp":1531180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Compared with traditional hiding methods, dual-image reversible data hiding methods have a higher embedding rate and a better quality stego image. Also, this is a special case of secret sharing, because secret data cannot be extracted from any stego image. In the literature, the frequencies of occurrence of secret data were used as reference information for data encoding, in which most digits were transformed into smaller ones. The encoding strategy can effectively decrease the modification level of the pixel. However, only limited literature has analyzed the relationship between the adjacent secret data. In this paper, we proposed an exclusive-or (XOR)-based encoding method to convert the neighboring values, thereby reducing the distortion. Since there are significant similarities between the two stego images and the original image, the first stego image is stored on an unmanned aerial vehicle (UAV) to avoid a hacker\u2019s interception attack. The second stego image on the UAV is sent to the command station. After completion of the UAV mission, the proposed method extracts the secret data from the two stego images to identify whether the second stego image has been tampered with.<\/jats:p>","DOI":"10.3390\/sym10070271","type":"journal-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T10:01:46Z","timestamp":1531216906000},"page":"271","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Effective Dual-Image Reversible Hiding for UAV\u2019s Image Communication"],"prefix":"10.3390","volume":"10","author":[{"given":"Yung-I","family":"Lin","sequence":"first","affiliation":[{"name":"Aeronautical Systems Research Division, National Chung-Shan Institute of Science and Technology, Taichung 40722, Taiwan"}]},{"given":"Ying-Hsuan","family":"Huang","sequence":"additional","affiliation":[{"name":"Aeronautical Systems Research Division, National Chung-Shan Institute of Science and Technology, Taichung 40722, Taiwan"}]},{"given":"Chih-Cheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Chung Hsing University, Taichung 40227, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information hiding\u2014A Survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/j.jss.2008.07.008","article-title":"A HDWT-based reversible data hiding method","volume":"82","author":"Chan","year":"2009","journal-title":"J. Syst. Softw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"7181","DOI":"10.1007\/s11042-014-1958-6","article-title":"Reversible DCT-based data hiding in stereo images","volume":"74","author":"Yang","year":"2015","journal-title":"Mult. Tools Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Reversible data hiding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Trans. Image Proc."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"key":"ref_6","first-page":"1549","article-title":"Prediction-error based reversible watermarking","volume":"3","author":"Thodi","year":"2004","journal-title":"IEEE Image Proc."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. Image Proc."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1587\/elex.5.870","article-title":"Reversible image data hiding based on gradient adjusted prediction","volume":"5","author":"Fallahpour","year":"2008","journal-title":"IEICE Electron Expr."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1016\/j.jss.2010.05.078","article-title":"Embedding capacity raising in reversible data hiding based on prediction of difference expansion","volume":"83","author":"Lee","year":"2010","journal-title":"J. Syst. Softw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1016\/j.patrec.2012.08.004","article-title":"An adaptive prediction-error expansion oriented reversible information hiding scheme","volume":"33","author":"Qin","year":"2012","journal-title":"Pattern Recogn. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","article-title":"An inpainting-assisted reversible steganographic scheme using histogram shifting mechanism","volume":"23","author":"Qin","year":"2013","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2620","DOI":"10.1016\/j.jss.2013.04.086","article-title":"Reversible watermarking method based on asymmetric-histogram shifting of prediction errors","volume":"86","author":"Chen","year":"2013","journal-title":"J. Syst. Softw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3361","DOI":"10.1007\/s11042-016-3960-7","article-title":"Multiple predictors hiding scheme using asymmetric histograms","volume":"76","author":"Lu","year":"2017","journal-title":"Multimed Tools Appl."},{"key":"ref_15","first-page":"633","article-title":"Dual-image based reversible data hiding scheme using pixel value difference expansion","volume":"18","author":"Jana","year":"2016","journal-title":"Inter. J. Netw. Sec."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Lee, C.F., Wang, K.H., Chang, C.C., and Huang, Y.L. (2009, January 15\u201316). A reversible data hiding scheme based on dual steganographic images. Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, Suwon, Korea.","DOI":"10.1145\/1516241.1516281"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","article-title":"Reversible data hiding scheme based on dual stegano-images using orientation combinations","volume":"52","author":"Lee","year":"2013","journal-title":"Telecommun. Syst."},{"key":"ref_18","first-page":"152","article-title":"(k, n)-image reversible data hiding","volume":"5","author":"Horng","year":"2014","journal-title":"J. Inf. Hiding Multimed. Signal Proc."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.sigpro.2014.08.022","article-title":"Dual imaging-based reversible hiding technique using LSB matching","volume":"108","author":"Lu","year":"2015","journal-title":"Signal Proc."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","article-title":"Dual-image-based reversible data hiding method using center folding strategy","volume":"15","author":"Lu","year":"2015","journal-title":"Signal Proc."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"23903","DOI":"10.1007\/s11042-016-4135-2","article-title":"Reversible data hiding in dual stego-images using frequency-based encoding strategy","volume":"76","author":"Lu","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","first-page":"1","article-title":"Reversible data hiding in dual stegano-image using an improved center folding strategy","volume":"77","author":"Chi","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","article-title":"Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion","volume":"135","author":"Yao","year":"2017","journal-title":"Signal Proc."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/271\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:11:26Z","timestamp":1760195486000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,10]]},"references-count":23,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,7]]}},"alternative-id":["sym10070271"],"URL":"https:\/\/doi.org\/10.3390\/sym10070271","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2018,7,10]]}}}