Skip to main content
Log in

Hybrid secret hiding schemes based on absolute moment block truncation coding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents two secret hiding schemes based on absolute moment block truncation coding (AMBTC). One is for embedding secrets into complex blocks and the other one is for smooth blocks. As for the smooth blocks, the small variation of the block is adopted to define the embedding rule to minimize the distortion after data embedding. As for the complex blocks, the large variation of the block is used to embed more secrets while maintaining good visual quality. In the experiments, when compared to Ou and Sun’s scheme, the positive data is to confirm the higher capacity while preserving better visual quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. http://homepages.lboro.ac.uk/~cogs/datasets/ucid/data/ucid.v2.tar.gz

References

  1. Alturki F, Mersereau R (2001) Secure blind image steganographic technique using discrete Fourier transformation. In: 2001 International Conference on Image Processing, vol. 2, pp. 542–545

  2. Balasubramanian C, Selvakumar S, Geetha S (2013) High payload image steganography with reduced distortion using coronary pixel pairing scheme. Multimedia Tool Appl: 1–23

  3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  4. Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1C2):123–138

    Article  MATH  Google Scholar 

  5. Chang CC, Chen YH, Lin CC (2009) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 13(4):321–331

    Article  Google Scholar 

  6. Chang CC, Kieu TD, Wu WC (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597–1603

    Article  MATH  Google Scholar 

  7. Chang CC, Lin CY (2006) Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans Inf Forensics Secur 1(4):493–501

    Article  Google Scholar 

  8. Chang CC, Lin CY, Fan YH (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recogn 41(7):2347–2357

    Article  MATH  Google Scholar 

  9. Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. Imaging Sci J 58(4):177–185

    Article  Google Scholar 

  10. Chen B, Latifi S, Kanai J (1999) Edge enhancement of remote image data in the DCT domain. Image Vis Comput 17(12):913–921

    Article  Google Scholar 

  11. Chen PY, Lin HJ (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275–290

    Google Scholar 

  12. Chuang JC, Chang CC (2006) Using a simple and fast image compression algorithm to hide secret information. Int J Comput Appl 28(4):329–333

    Google Scholar 

  13. Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

  14. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22–28

    Article  Google Scholar 

  15. Guo JM, Lin CY (2010) Parallel and element-reduced error-diffused block truncation coding. IEEE Trans Commun 58(6):1667–1673

    Article  MathSciNet  Google Scholar 

  16. Guo JM, Liu YF (2010) Improved block truncation coding using optimized dot diffusion. IEEE Trans Image Process 23(3):2634–2637

    MathSciNet  Google Scholar 

  17. Hashad AI, Madani AS, Wahdan A (2005) A robust steganography technique using discrete Cosine transform insertion. In: ITI 3rd International Conference on: Information and Communications Technology, 2005. Enabling Technologies for the New Knowledge Society, pp. 255–264

  18. Hong W, Chen TS, Shiu CW (2008) Lossless steganography for AMBTC-compressed images. Int Congr Image Signal Process 2:13–17

    Article  Google Scholar 

  19. Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. J Electron Imaging 22(1):013,012–013,012

    Article  Google Scholar 

  20. Kamstra L, Heijmans HJ (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  21. Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  22. Lin CC, Chang CC, Chen YH (2014) A novel SVD-based watermarking scheme for protecting rightful ownership of digital images. J Inf Hiding Multimedia Sign Proccess 5(2):124–143

    Google Scholar 

  23. Lin CC, Chen YH, Chang CC (2009) LSB-based high-capacity data embedding scheme for images. Int J Innov Comput Inf Cont 5(11B):4283–4289

    Google Scholar 

  24. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214

    Article  Google Scholar 

  25. Munteanu A, Cornelis J, Auwera GVD, Cristea P (1999) Wavelet image compression – the quadtree coding approach. IEEE Trans Inf Technol Biomed 3(3):176–185

    Article  Google Scholar 

  26. Omoomi M, Samavi S, Dumitrescu S (2011) An efficient high payload +1 data embedding scheme. Multimedia Tool Appl 54(2):201–218

    Article  Google Scholar 

  27. Ou D, Sun W (2014) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tool Appl :1–23.

  28. Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  29. Shi YQ, Xuan G, Zou D et al (2005) Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. Int Conf Multimedia Expo 2005:269–272

    Google Scholar 

  30. Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2):297–306

    Article  Google Scholar 

  31. Walker JS (1996) Fast Fourier transforms, 2nd edn. CRC Press, Boca Raton

    MATH  Google Scholar 

  32. Yang H, Yin J (2013) A secure removable visible watermarking for BTC compressed images. Multimedia Tool Appl :1–15.

  33. Zhang Y, Shi-Ze G, Zhe-Ming L, Hao L (2013) Reversible data hiding for BTC-compressed images based on lossless coding of mean tables. IEICE Trans Commun 96(2):624–631

    Article  Google Scholar 

Download references

Acknowledgments

Many thanks for the support by Ministry of Science and Technology in Taiwan under Grant number MOST 104-2221-E-468-005. Our gratitude also goes to Michael Burton, Asia University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-Hui Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, YH., Chang, CC. & Chen, YH. Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed Tools Appl 76, 6159–6174 (2017). https://doi.org/10.1007/s11042-015-3208-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3208-y

Keywords

Navigation