Advertisement

A difference matching technique for data embedment based on absolute moment block truncation coding

  • Wien Hong
  • Yizhen Li
  • Shaowei Weng
Article
  • 18 Downloads

Abstract

In this paper, an optimized data embedding method based on Huang et al.’s work for absolute moment block truncation coding (AMBTC) is proposed. Huang et al.’s work successfully exploits the difference of quantization levels (QLs) for data embedment and has an excellent embedding performance. However, the modified QLs are not adjusted to minimize the distortion. In some rare cases, they might exceed the grayscale range. Moreover, the order of QLs in smooth blocks is not utilized for data embedment, losing the chance to embed one additional bit without deteriorating the image block. We propose a method to give analytical solutions to adjust QLs such that the distortions in both smooth and complex blocks are minimized. A subtle mechanism is also provided to ensure that no QLs will overflow or underflow. Moreover, the order of QLs is utilized in data embedment to further increase the payload without sacrificing the image quality. The experimental results reveal that the proposed method offers a better image quality over Huang et al.’s and other state-of-the-art works while providing a comparable or larger payload.

Keywords

AMBTC Data embedding Difference matching 

Notes

Funding

This work was supported in part by National NSF of China (Nos. 61872095, 61872128, 61571139, 61201393), New Star of Pearl River on Science and Technology of Guangzhou (No. 2014J2200085).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflicts of interest.

References

  1. 1.
    BOWS-2 Image Database. Available: http://bows2.ec-lille.fr/. Accessed 30 June 2018
  2. 2.
    Chang CC, Chen TS, Wang YK, Liu Y (2018) A Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using Exclusive OR Operator. Multimedia Tools and Applications 77:9039–9053CrossRefGoogle Scholar
  3. 3.
    Chang CC, Lin CC, Liu XL, Yuan SM (2016) A Survey of Fragile Watermarking-Based Image Authentication Techniques. Journal of Information Hiding and Multimedia Signal Processing 7(6):1282–1292Google Scholar
  4. 4.
    Chang CC, Liu XL, Lin CC, Yuan SM (2016) A High-Payload Reversible Data Hiding Scheme Based on Histogram Modification in JPEG Bitstream. Imaging Science Journal 7:364–373Google Scholar
  5. 5.
    Chang CC, Nguyen TS, Lin MC, Lin CC (2016) A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ Indices. Digital Signal Processing 51(1):142–155MathSciNetCrossRefGoogle Scholar
  6. 6.
    Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC Compressed Images Using no Distortion Technique. The Imaging Science Journal 58(4):177–185CrossRefGoogle Scholar
  7. 7.
    Chuang JC, Chang CC (2006) Using a Simple and Fast Image Compression Algorithm to Hide Secret Information. Int J Comput Appl 28(4):329–333Google Scholar
  8. 8.
    Delp E, Mitchell O (1979) Image Compression Using Block Truncation Coding. IEEE Trans Commun 27(9):1335–1342CrossRefGoogle Scholar
  9. 9.
    Hong W (2013) Adaptive Image Data Hiding in Edges Using Patched Reference Table and Pair-wise Embedding Technique. Inf Sci 221:473–489CrossRefGoogle Scholar
  10. 10.
    Hong W, Chen TS, Chen J (2015) Reversible Data Hiding Using Delaunay Triangulation and Selective Embedment. Inf Sci 308:140–154MathSciNetCrossRefGoogle Scholar
  11. 11.
    Hong W, Chen J, Chen TS, Shiu CW (2011) Steganography for Block Truncation Coding Compressed Images Using Hybrid Embedding Scheme. International Journal of Innovative Computing, Information and Control 7(2):1–11Google Scholar
  12. 12.
    Hong W, Zhou X, Weng S (2018) Joint Adaptive Coding and Reversible Data Hiding for AMBTC Compressed Images. Symmetry 10.  https://doi.org/10.3390/sym10070254
  13. 13.
    Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. Journal of Electronic Imaging 22(1)Google Scholar
  14. 14.
    Huang YH, Chang CC, Chen YH (2017) Hybrid Secret Hiding Schemes Based on Absolute Moment Block Truncation Coding. Multimedia Tools and Applications 76(5):6159–6174CrossRefGoogle Scholar
  15. 15.
    Lee CF, Chen KN, Chang CC, Tsai MC (2011) A Hierarchical Fragile Watermarking with VQ Index Recovery. J Multimed 6(3):277–284CrossRefGoogle Scholar
  16. 16.
    Lema M, Mitchell O (1984) Absolute Moment Block Truncation Coding and Its Application to Color Image. IEEE Trans Commun 32(10):1148–1157CrossRefGoogle Scholar
  17. 17.
    Li W, Lin CC, Pan JS (2016) Novel Image Authentication Scheme with Fine Image Quality for BTC-Based Compressed Images. Multimedia Tools and Applications 75(8):4771–4793CrossRefGoogle Scholar
  18. 18.
    Lin CC, Huang Y, Tai WL (2014) A High-Quality Image Authentication Scheme for AMBTC-Compressed Images. KSII Transactions on Internet and Information Systems 12:4588–4603Google Scholar
  19. 19.
    Lou DC, Hu CH (2012) LSB Steganographic Method Based on Reversible Histogram Transformation Function for Resisting Statistical Steganalysis. Inf Sci 188(4):346–358CrossRefGoogle Scholar
  20. 20.
    Lyu WL, Chang CC, Chou YC, Lin CC (2015) Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. Journal of Information Hiding and Multimedia Signal Processing 6(4):686–696Google Scholar
  21. 21.
    Mielikainen J (2006) LSB Matching Revisited. IEEE Signal Processing Letters 13(5):285–287CrossRefGoogle Scholar
  22. 22.
    Ou D, Sun W (2015) High Payload Image Steganography with Minimum Distortion Based on Absolute Moment Block Truncation Coding. Multimedia Tools and Applications 74(21):9117–9139CrossRefGoogle Scholar
  23. 23.
    The USC-SIPI Image Database. Available: http://sipi.usc.edu/database/. Accessed 30 June 2018
  24. 24.
    Wang C, Yang H, Bartz C, Meinel C (2016) Image captioning with deep bidirectional LSTMs. Proceedings of the 2016 ACM on Multimedia Conference, pp. 988-997Google Scholar
  25. 25.
    Wang C, Yang H, Meinel C (2015) Deep semantic mapping for cross-modal retrieval. Proceedings of the IEEE 27th International Conference on Tools with Artificial Intelligence, pp. 234-241Google Scholar
  26. 26.
    Wang C, Yang H, Meinel C (2016) A Deep Semantic Framework for Multimodal Representation Learning. Multimedia Tools and Applications 75(15):9255–9276CrossRefGoogle Scholar
  27. 27.
    Wang C, Yang H, Meinel C (2018) Image Captioning with Deep Bidirectional LSTMs and Multi-Task Learning. ACM Trans Multimed Comput Commun Appl 40(2s):1–20Google Scholar
  28. 28.
    Weng S, Pan JS (2016) Reversible Data Hiding Based on an Adaptive Pixel-Embedding Strategy and Two-layer Embedding. Inf Sci 369:144–159CrossRefGoogle Scholar
  29. 29.
    Wu WC (2017) Quantization-Based Image Authentication Scheme Using QR Error Correction. EURASIP Journal on Image and Video Processing 2017(1):1–12CrossRefGoogle Scholar
  30. 30.
    Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781–783CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Electrical and Computer EngineeringNanfang College of Sun Yat-Sen UniversityGuangzhouChina
  2. 2.School of Information EngineeringGuangdong University of TechnologyGuangzhouChina

Personalised recommendations