Next Article in Journal
Feasibility Evaluation of Computational Fluid Dynamics Approach for Inhalation Exposure Assessment: Case Study for Biocide Spray
Next Article in Special Issue
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
Previous Article in Journal
Rapid Planning of an Assembly Path by Reusing the Prior Path
Previous Article in Special Issue
Velody 2—Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference

1
School of Information, Zhejiang University of Finance & Economics, Hangzhou 310018, China
2
Department of Computer Science and Information Engineering, Feng Chia University, Taichung 407032, Taiwan
3
School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
4
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung 41170, Taiwan
*
Author to whom correspondence should be addressed.
Submission received: 29 November 2020 / Revised: 28 December 2020 / Accepted: 28 December 2020 / Published: 11 January 2021

Abstract

:
Hiding a message in compression codes can reduce transmission costs and simultaneously make the transmission more secure. This paper presents an adaptive reversible data hiding scheme that is able to provide large embedding capacity while improving the quantity of modified images. The proposed scheme employs the quantization level difference (QLD) and interpolation technique to adaptively embed the secret information into pixels of each absolute moment block truncation coding (AMBTC)-compressed block, except for the positions of two replaced quantization levels. The values of QLD tend to be much larger in complex areas than in smooth areas. In other words, our proposed method can obtain good performance for embedding capacity and still meets the requirement for better modified image quality when the image is complex. The performance of the proposed approach was compared to previous image hiding methods. The experimental results show that our approach outperforms referenced approaches.

1. Introduction

With the rapid development of internet communication and computer technology, a large number of information is transmitted over the internet. When digital data are transmitted through the internet, some sensitive data may become vulnerable to the malicious users. Therefore, to ensure the security of the transmitted data, data owners either encrypt the transmitted data via traditional cryptographic algorithms or transfer data into an imperceptible way by using data hiding techniques [1]. In the last decade, multimedia-based transmission has become popular; as such, data hiding techniques are a secure and efficient method for such applications. Data hiding is a way to embed secret data into a digital cover media by modifying the original content, such that other users in a public network will not be aware of the existence of the embedded data. If malicious users have not noticed the transmitted data concealing confidential data, the safety of hidden data is guaranteed. Generally, a data hiding scheme can be divided into three categories, i.e., spatial domain, frequency domain, and compressed domain. The spatial domain method imparts some meaningful changes in the image pixels in order to embed information. The frequency domain method and compressed domain method embed the secret data into transformed coefficients and the compressed codes of digital images, respectively [2].
In order to transmit multimedia data efficiently on the internet, many researchers have proposed various compression methods to reduce the size of multimedia files, such as vector quantization (VQ) [3,4,5], discrete wavelet transform (DWT) [6,7,8], and discrete cosine transform (DCT) [9,10,11]. Qin et al. [3] proposed a data hiding scheme based on VQ compressed images and an index mapping mechanism. Ahmed et al. [6] proposed a data hiding method based on DWT. Their method hides a secret image inside a cover image by using two secret keys. Chang [11] et al. proposed a scheme to hide the secret information in the DCT coefficient domain. In this scheme, the image is divided into 8 × 8 blocks, where if two successive coefficients of the medium-frequency components are zero, the information is hidden in each block.
Block truncation coding (BTC) [12] is another efficient lossy block-based image compression technique. In recent years, many researchers have studied data hiding based on BTC and made improvements, such as absolute block truncation coding (AMBTC) [13], ordered dither block truncation coding (ODBTC) [14], error Diffusion Block truncation coding (EDBTC) [15], etc. BTC is characterized by low complexity and low memory, and thus it has become an ideal data hiding domain. Wu and Sun [16] presented a data hiding method in which each secret bit is embedded into the bitmap of the BTC compression codes. Kim [17] proposed a data hiding method for halftone compressed images based on ODBTC and exploiting modification direction (EMD). Guo et al. [18] introduced a data hiding scheme based on error-diffused BTC to embed an extremely large amount of watermarks without obviously damaging image quality. These methods are irreversible, and the host image is permanently altered and it cannot be recovered accurately after data extraction. However, in some applications such as medical image sharing, military image processing, remote sensing and multimedia archive management, the recovery of a host image is essential [19]. To address this problem, a reversible data hiding scheme [20] were proposed that can extract the hidden data and produce a lossless recovery of the cover image. As Zhao et al. mentioned [1], the key property of reversible data hiding is not only the secret data but also the host image can be accurately recovered in the recorder.
In 2008, Chang et al. [21] presented a reversible data hiding method aimed at BTC-compressed color images. In 2011, Li et al. [22] introduced a reversible image hiding based on the BTC-compressed approach. In this scheme, the histogram shifting and bitmap flipping technique were used to hide secret bits. In 2013, Sun et al. [23] introduced another reversible data hiding method for BTC-compressed using the joint neighbor coding technique. In 2015, Lin et al. [24] presented a reversible data hiding scheme for AMBTC-compressed images by combining secret bits with bitmap bits one by one.
In this paper, we propose an adaptive reversible data hiding scheme that is based on an AMBTC compression domain and quantization level difference. In this scheme, the cover image is compressed into corresponding quantizers and a bitmap image by absolute moment block truncation coding (AMBTC). Subsequently, a certain amount of the data bits will be embedded into this pixel according to the value of QLD. The rest of this paper consists of four sections: AMBTC’s and Lin et al.’s methods are introduced in Section 2; the proposed algorithm is illustrated in Section 3; detailed experimental description and comparative analysis are provided in Section 4; and finally, the conclusions are offered in Section 5.

2. Related Work

2.1. Absolute Moment Block Truncation Coding (AMBTC)

As a variant of BTC, AMBTC was introduced by Lema and Mitchell [13] in 1984. During the encoding procedure, the algorithm divides the original image into a set of non-overlapped blocks with a size of k × k. Assume that x i j is the pixel value in location ( i , j ) of the block, the mean value u and its standard deviation α are computed by Equations (1) and (2), respectively.
u = 1 k × k i = 1 k j = 1 k x i j ,  
α = j = 1 k × k | x i j 2 u 2 | k × k .  
Then, each block is converted to two quantizers and a bitmap image bm. The two quantizers hm and lm for the block are computed by:
l m = u α q k × k q   ,
h m = u + α k × k q q   ,
where q is the number of pixels that are greater than or equal to the mean value u. The bitmap b m = { m i j | m i j { 0 , 1 } , 1 i , j k } is created as follows:
m i j = { 1 ,   if   x i j u   0 ,   if   x i j < u .
Figure 1 shows an example to describe the procedures for the AMBTC scheme. Figure 1a shows the original image block of 4 × 4 pixels. Then, the block mean u and standard deviation α are computed, respectively, by using Equations (1) and (2). In this example, u = 110 and α = 10 . The bitmap generated by AMBTC is shown in Figure 1b. Finally, the quantization levels, namely l m and h m , are calculated by using Equations (3) and (4), respectively. Figure 1c shows the reconstructed image block.

2.2. AMBTC Scheme of Lin et al.’s Method

In 2015, Lin et al. presented a reversible data hiding scheme for AMBTC-compressed images by considering the mean value and the standard deviation to achieve a high payload and high-quality modified images. Following are details about the major steps of the embedding processing.
Step 1: Define three parameters, i.e., the bitmap b m , mean pixel value u and standard deviation α using Equations (1), (2) and (5), respectively.
Step 2: Define four different scenarios for each pixel of a given k × k block. As shown in Table 1, if the secret bit is “1”, and the bit in bitmap is “0”, then the corresponding scenario is “10” by combining secret bits with bits of the bitmap.
Step 3: Determine the cover image block is embeddable or non-embeddable. If there are only one or two different scenarios, this cover block is a non-embeddable block. If the types of scenarios are equal to three or four, the cover is an embeddable block.
Step 4: Determine the hiding strategy. The detailed Algorithm 1 for hiding strategies is shown below.
Algorithm 1. Hiding strategy of Lin’s method.
Input: current scenarios
Output: corresponding pixel value
cpv   corresponding pixel value
Switch(current scenarios){
    case 00 : c p v = u α ; b r e a k ; case 01 : c p v = u + α ; b r e a k ; case 10 : c p v = u α 1 ; b r e a k ; case 11 : c p v = u α + 1 ; b r e a k ;
}
returncpv;
Figure 2 shows an example of the strategy. Figure 2a shows the secret bits and the corresponding bitmap. Figure 2b shows a combination. There are four types of in this example. Figure 2c shows the result according to Algorithm 1.

3. The Proposed Scheme

This section may be divided by subheadings. It should provide a concise and precise description of the experimental results, their interpretation as well as the experimental conclusions that can be drawn. This section describes the details of our method. Our proposal utilizes an adaptive interpolation technique and AMBTC compression technique, to improve embedding capacity and image quality. As we utilize the difference of two quantization levels to adaptively embed the secret data into the cover image, our method can obtain a high embedding capacity. Moreover, our method still meets good image quality as we exploit the middle value of two quantization levels and the values of two thresholds to limit the shifting of values. The flowcharts of embedding and extraction phases for our proposed scheme are shown in Figure 3, Figure 4, Figure 5 and Figure 6, respectively.

3.1. Embedding Phase

The process of embedding phase is shown in Figure 3. Let I be an input cover image sized H × W . Each block b i is sized k × k , where i = 0 ,   1 ,   ,   H k × W k 1 . Secret data S is a bit stream in binary form, and M n is the decimal value of secret bits.
Input: Cover image I and secret data S.
Output: Modified image I .
Step 1. Divide I into k × k non-overlapping blocks b i ’s.
Step 2. Calculate the current processing block b i using AMBTC algorithm.
Step 3. Compute d i using Equation (6).
d i = h i l i ,
where h i and l i are quantization levels of high value and low value, respectively.
Step 4. Determine the value of d i . If 3 < d i < 64 , go to Step 5. Otherwise, go to Step 7.
Here, if d i is smaller than 3, the secret data cannot be extracted because of the middle value of two quantization levels could not be determined. For example, the values of h i and l i are 9 and 7, respectively. We cannot know whether the modified pixel value p n is h i 1 or l i + 1 while p n is 8. Therefore, d i must be greater than 3. And if d i is greater than 63, it may cause a problem where the difference of the current processing block and its neighbor blocks are very large. As such, d i should be smaller than 63.
Step 5. Find out the first b p n = 0 (FL) and the last b p n = 1 (LH) in the bitmap, where b p n is the presented value in the bitmap and n = 0 ,   1 ,   ,   k × k 1 . FL and LH are the first value 0 and the last value 1 in the bitmap, respectively. The locations of FL and LH are r 1 and r 2 , respectively, where r 1 and r 2 are 0 ,   1 ,   or   k × k 1 . We show an example in Figure 4 to describe in detail the process of scanning FL and LH.
Step 6. Compute the value of a i using Equation (7). Then, embed the M n into each p n using Equation (8),
a i = log 2 ( d i 2 ) ,
p n = { h i   ,   if   n = r 2   l i   ,   if   n = r 1   h i M n ,   if   b p n = 1   and   n r 1   or   r 2 l i + M n ,   if   b p n = 0   and   n r 1   or   r 2 ,
where M n is the decimal value of the next a i secret bits to be embedded, p n is the pixel value in the block b i and p n is the modified pixel value in the modified block.
Step 7. Modify the value of each p n in block b i using Equation (9) that no secret data are embedded.
p n = { h i ,   if   b p n = 1 l i ,   if   b p n = 0 .
Step 8. Repeat Step 2 to Step 7 until all blocks b i ’s are processed.
Step 9. Obtain modified image I .
We can get modified image I when all steps are finished. We provide an example to further clarify our embedding process in Figure 5. In Figure 5, (a) shows an example of a 4 × 4 sized block b i , (b) is the bitmap of block b i , (c) presents secret data S and the decimal value M n of each a i secret bits and (d) shows the final result of modified image I . In the first step, utilize the AMBTC algorithm to compute the block b i and obtain two quantization levels l i and h i . As a i is 3, S will be partitioned into multiple groups and each group contains three secret bits. Then, convert each group of a i secret bits into decimal value M n . The positions of r 1   and   r 2 are utilized to substitute the values of l i and h i , respectively. Moreover, no secret bits are embedded in them. As such M r 1 and M r 2 , we use N/A to represent. In the next step, embed M n into each p n using Equation (8). And finally, S can be embedded into the block b i and obtain the modified block b i .

3.2. Extraction and Recovery Phase

The processes for the extraction and recovery phases are shown in Figure 6. S will be extracted from modified image I . When the block b i belongs to a non-embedding case, there are only two values in it. Therefore, we do not need any extra information to record whether this block has secret data or not.
Input: Modified image I .
Output: Secret data S and the cover image I.
Step 1. Divide I into k × k non-overlapping blocks b i ’s.
Step 2. Calculate the frequency f of the number of different pixels in the current processing block b i . The Algorithm 2 is described as follows.
Algorithm 2. Procedure for calculating the frequency.
Output: Frequency f
for i = 0 to k × k − 1. do
  if p i + 1 p 0 , 1 , j . then
    f = f + 1;
  endif
  j++;
end for
Step 3. Determine the value of f. If f > 2 , go to step 4. Otherwise, go back to Step 2.
Step 4. Sort all p n ’s in the block b i in ascending order. The first and last values in the sorted sequence are l i and h i , respectively. And the positions of l i and h i are r 1 and r 2 , respectively.
Step 5. Compute the values of d i and a i utilizing Equations (6) and (7), respectively. Extract the secret data from p n ’s using Equation (10).
M n = { h i p n ,   if   p n > l i +   h i 2   and   n r 1   or   r 2 p n l i ,   if   p n < l i +   h i 2   and   n r 1   or   r 2 .
Then, convert M n into a i secret bits and add in S.
Step 6. Recover block b i using Equation (11).
p n = { h i ,   if   p n > l i +   h i 2   l i ,   if   p n < l i +   h i 2   .  
Step 7. Repeat Step 2 to Step 6 until all modified blocks b i ’s are processed.
Step 8. Obtain the cover image I and secret data S.
After all steps are computed, we can extract S from modified block b i and recover each b i using min{ p n } and max{ p n } after sorting. We used l i and h i to replace the positions of FL and LH, respectively. This allows us to know l i and h i utilizing the ascending order of all p n ’s in modified block b i while extracting. This approach can avoid the problem when the value of M n is 0. We also provide a detailed example of the extraction and recovery phases in Figure 7. In Figure 7, (a) presents the modified block b i that follows the previous example in Figure 5, (b) shows the results of extracted M n and S in binary form and (c) is the resulting block b i after recovery. Firstly, calculate the frequency f and determine whether the value of f is greater than 2. Then, all p n ’s in the modified block b i will be sorted in ascending order. The first and last values are l i and h i , respectively. According to the first and last values in a sorted sequence corresponding positions in modified block b i , the positions of r 1   and   r 2 are 1 and 14, respectively. Next step, M n will be extracted from modified block b i using Equation (8). Each M n will be converted into a i secret bits and added in the S. In the last step, recover each p n using Equation (9). Finally, we can get block b i and extract S from the modified block b i .

4. The Proposed Scheme

The section provides some experimental results to show the hiding capacity (bits) and image quality (dB) of our proposed scheme. In Figure 8, all of the experiments were performed with six commonly used grayscale test images: Lena, F-16, Sailboat, Girl, Toys, and Barbara. All are of the same size, 512 × 512 . The size of each block b i is 4 × 4 . The embedded secret data are composed of a random bit-stream that was produced from a random number generator.
In these experiments, the visual quality of the modified images was evaluated by using peak signal-to-noise ratio (PSNR) as defined in Equation (12).
P S N R = 10 × log 10 ( 255 2 M S E ) ,
The definition of mean square error (MSE) is shown in Equation (13).
M S E = 1 H × W i = 0 H k × W k 1 n = 0 k × k 1 ( p n i p n i ) 2 ,  
where p n i and p n i are the stego pixels and original pixels in each modified block and original block, respectively.
To demonstrate the performance results for our proposed scheme, our method was compared with previous reversible data hiding methods in two aspects. In the first group, the proposed scheme was compared with other BTC-based schemes [21,22,23,24]. Figure 9a and Table 2 show the results of this comparison. Figure 9a shows, the good performance for embedding capacity that was achieved in our scheme. The proposed method can embed 56 bits in each 4 × 4 pixel block while the difference between two quantization levels is larger than 32. However, Lin et al.’s scheme can embed 16 bits in each 4 × 4 pixel block. And in the schemes of Chang et al.’s, Li et al.’s, and Sun et al.’s, each 4 × 4 pixel block can only be embedded 1, 2 and 4 bits, respectively. In our scheme, the capacity for, “Lena”, “F-16”, “Sailboat”, “Girl”, “Toys” and “Barbara”, were 324,548 (bits); 267,386 (bits); 432,796 (bits); 388,780 (bits); 292,250 (bits) and 449,876 (bits), respectively.
In our scheme, the image obtained a higher embedding capacity even with complex images such as “Barbara” and “Sailboat”, because our adaptive interpolation technique is related to the difference of two quantization levels. However, the capacity is relatively small in smooth images, such as “Lena”, “F-16′ and “Toys”. Table 2 shows a comparison of image quality. In Chang et al.’s and Sun et al.’s schemes, the cover image cannot be directly obtained from a stego compression code. Therefore, the two methods cannot be compared in terms of image quality of a modified image. From Table 2, the proposed scheme cannot achieve the best PSNR in every test image. In the “Lena”, Lin et al.’s scheme achieves the best results, and Li et al.’s scheme provides the best results in the “Sailboat”. But our method achieves a higher average. In brief, the first experiment shows that our scheme achieves the higher embedding capacity while maintaining relative good, modified image quality.
In the second group, we compared some reversible data methods that are not based on a BTC-compressed technique [4,20,25]. These three other techniques hide secret data in the spatial domain. As shown in Figure 9b and Table 3, our method obtains good performance in comparison with the other methods. In Chiou et al.’s scheme, secret data cannot be embedded into the blocks in the first row and first column. Tai et al.’s scheme and Celik et al.’s cannot embed secret data in some cases. In our method, although secret data cannot be embedded when the difference of two quantization levels is smaller than 4, our scheme still can obtain a better hiding capacity than other schemes when conditions were similar for PSNR. The experimental results show that, our proposed scheme was better than other reversible data hiding schemes.

5. Conclusions

This paper proposed an adaptive reversible image hiding method using AMBTC compression by considering the quantization level difference of each block. According to our adaptive embedding strategy, more bits are embedded into the image sub-block located in regions where the value of QLD is larger. However, in order to ensure the quality of the image, when the value of the QLD of a sub-block is greater than the threshold, this block will not embed information. Experimental results showed that the performance of the proposed scheme is better than the previous schemes in terms of payload and modified image quality.

Author Contributions

Conceptualization, Y.-H.C. and C.-C.C.; methodology, C.-C.L.; software, Z.-M.W.; validation, C.-C.L.; writing—original draft preparation, Y.-H.C. and Z.-M.W.; writing—review and editing, C.-C.L.; project administration, C.-C.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data available in a publicly accessible repository.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhao, Z.; Luo, H.; Lu, Z.-M.; Pan, J.-S. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU Int. J. Electron. Commun. 2011, 65, 814–826. [Google Scholar] [CrossRef]
  2. Chang, I.-C.; Hu, Y.-C.; Chen, W.-L.; Lo, C.-C. High capacity reversible data hiding scheme based on residual histogram shift-ing for block truncation coding. Signal Process. 2015, 108, 376–388. [Google Scholar] [CrossRef]
  3. Cheng, P.-H.; Chang, K.-C.; Liu, C.-L. A reversible data hiding scheme for VQ indices using histogram shifting of prediction errors. Multimed. Tools Appl. 2015, 76, 6031–6050. [Google Scholar] [CrossRef]
  4. Chiou, S.; Liao, I.; Hwang, M. A capacity-enhanced reversible data hiding scheme based on SMVQ. Imaging Sci. J. 2011, 59, 17–24. [Google Scholar] [CrossRef]
  5. Nasrabadi, N.M.; King, R.A. Image coding using vector quantization: A review. IEEE Trans. Commun. 1988, 36, 957–971. [Google Scholar] [CrossRef] [Green Version]
  6. Abdelwahab, A.A.; Hassaan, L.A. A Discrete Wavelet Transform Based Technique for Image Data Hiding. In Proceedings of the 2008 National Radio Science Conference, Institute of Electrical and Electronics Engineers (IEEE), Tanta, Egypt, 18–20 March 2008; pp. 1–9. [Google Scholar]
  7. Al-Asmari, A.K.; Salama, A.; Iliyasu, A.M.; Al-Qodah, M.A. A DWT Ordering Scheme for Hiding Data in Images Using Pixel Value Difference. In Proceedings of the IEEE Eighth International Conference on Computational Intelligence and Security (CIS), Guangzhou, China, 17–18 November 2012; pp. 553–557. [Google Scholar]
  8. Lai, B.-L.; Chang, L.-W. Adaptive data hiding for images based on harr discrete wavelet transform. In Advances in Image and Video Technology; Springer: Berlin/Heidelberg, Germany, 2006; pp. 1085–1093. [Google Scholar]
  9. Lin, Y.-K. A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interfaces 2014, 36, 855–862. [Google Scholar] [CrossRef]
  10. Alturki, F.T.; Almutairi, A.F.; Mersereauu, R.M. Analysis of blind data hiding using discrete cosine transform phase modula-tion. Signal Process. Image Commun. 2007, 22, 347–362. [Google Scholar] [CrossRef]
  11. Chang, C.-C.; Lin, C.-C.; Tseng, C.-S.; Tai, W.-L. Reversible hiding in DCT-based compressed images. Inf. Sci. 2007, 177, 2768–2786. [Google Scholar] [CrossRef]
  12. Delp, E.; Mitchell, O. Image Compression Using Block Truncation Coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
  13. Lema, M.; Mitchell, O. Absolute Moment Block Truncation Coding and Its Application to Color Images. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
  14. Guo, J.-M.; Wu, M.-F. Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach. IEEE Trans. Image Process. 2009, 18, 211–213. [Google Scholar] [CrossRef] [PubMed]
  15. Guo, J.-M. Improved block truncation coding using modified error diffusion. Electron. Lett. 2008, 44, 462. [Google Scholar] [CrossRef]
  16. Wu, X.; Sun, W. Data Hiding in Block Truncation Coding. In Proceedings of the IEEE International Conference on Computational Intelligence and Security (CIS), New York, NY, USA, 11–14 December 2010; pp. 406–410. [Google Scholar]
  17. Kim, C. Data hiding based on compressed dithering images. In Advances in Intelligent Information and Database Systems; Springer: Berlin/Heidelberg, Germany, 2010; pp. 89–98. [Google Scholar]
  18. Guo, J.-M.; Liu, Y.-F. High Capacity Data Hiding for Error-Diffused Block Truncation Coding. IEEE Trans. Image Process. 2012, 21, 4808–4818. [Google Scholar] [CrossRef]
  19. Peng, F.; Li, X.; Yang, B. Adaptive reversible data hiding scheme based on integer transform. Signal Process. 2012, 92, 54–62. [Google Scholar] [CrossRef]
  20. Celik, M.; Sharma, G.; Tekalp, A.; Saber, E. Reversible Data Hiding. In Proceedings of the International Conference on Image Processing, Institute of Electrical and Electronics Engineers (IEEE), New York, NY, USA, 20 March 2006; Volume 2, p. II-157. [Google Scholar]
  21. Chang, C.-C.; Lin, C.-Y.; Fan, Y.-H. Lossless data hiding for color images based on block truncation coding. Pattern Recognit. 2008, 41, 2347–2357. [Google Scholar] [CrossRef]
  22. Li, C.-H.; Lu, Z.-M.; Su, Y.-X. Reversible Data Hiding for Btc-compressed Images Based on Bitplane Flipping and Histogram Shifting of Mean Tables. Inf. Technol. J. 2011, 10, 1421–1426. [Google Scholar] [CrossRef] [Green Version]
  23. Sun, W.; Lu, Z.-M.; Wen, Y.-C.; Yu, F.-X.; Shen, R.-J. High performance reversible data hiding for block truncation coding com-pressed images. Signal Image Video Process. 2013, 7, 297–306. [Google Scholar] [CrossRef]
  24. Lin, C.-C.; Liu, X.-L.; Tai, W.-L.; Yuan, S.-M. A novel reversible data hiding scheme based on AMBTC compression technique. Multimed. Tools Appl. 2013, 74, 3823–3842. [Google Scholar] [CrossRef]
  25. Tai, W.-L.; Yeh, C.-M.; Chang, C.-C. Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol. 2009, 19, 906–910. [Google Scholar] [CrossRef]
Figure 1. Example of absolute block truncation coding (AMBTC) encoding procedures.
Figure 1. Example of absolute block truncation coding (AMBTC) encoding procedures.
Applsci 11 00635 g001
Figure 2. Example of Lin et al.’s hiding strategy.
Figure 2. Example of Lin et al.’s hiding strategy.
Applsci 11 00635 g002
Figure 3. Flowchart of embedding phase.
Figure 3. Flowchart of embedding phase.
Applsci 11 00635 g003
Figure 4. The example of FL and LH scanning.
Figure 4. The example of FL and LH scanning.
Applsci 11 00635 g004
Figure 5. (a) Block b i   sized   4 × 4 , (b) The bit map of block b i , (c) Secret data S and (d) The modified block b i sized   4 × 4 .
Figure 5. (a) Block b i   sized   4 × 4 , (b) The bit map of block b i , (c) Secret data S and (d) The modified block b i sized   4 × 4 .
Applsci 11 00635 g005
Figure 6. The flowchart of extraction and recovery phases.
Figure 6. The flowchart of extraction and recovery phases.
Applsci 11 00635 g006
Figure 7. (a) The modified block b i sized   4 × 4 , (b) Secret data S and (c) block b i   sized   4 × 4 .
Figure 7. (a) The modified block b i sized   4 × 4 , (b) Secret data S and (c) block b i   sized   4 × 4 .
Applsci 11 00635 g007
Figure 8. Test images (a) Lena; (b) F-16; (c) Sailboat; (d) Girl; (e) Toys; (f) Barbara.
Figure 8. Test images (a) Lena; (b) F-16; (c) Sailboat; (d) Girl; (e) Toys; (f) Barbara.
Applsci 11 00635 g008
Figure 9. Comparative performance of pure hiding capacity for six test images between our method and other methods. (a) Comparisons with ours and other schemes based on BTC and (b) comparisons with ours and other schemes which are not based on BTC.
Figure 9. Comparative performance of pure hiding capacity for six test images between our method and other methods. (a) Comparisons with ours and other schemes based on BTC and (b) comparisons with ours and other schemes which are not based on BTC.
Applsci 11 00635 g009
Table 1. Four scenarios for each pixel of a given block.
Table 1. Four scenarios for each pixel of a given block.
ScenarioCase00Case01Case10Case11
secret bit0011
Bit in bitmap0101
Table 2. Comparative performance of PSNR (dB) for six test images between our method and other methods base on BTC.
Table 2. Comparative performance of PSNR (dB) for six test images between our method and other methods base on BTC.
SchemeLenaF-16SailboatGirlToysBarbaraAverage
Our scheme32.5932.2230.1633.3032.1228.8231.54
Lin et al.’s [24]33.0531.6430.3233.3630.9928.6331.33
Li et al.’s [22]32.3431.9330.4133.4431.1528.8231.34
Chang et al.’s [21]Cannot be constructed by the modified code stream
Sun et al.’s [23]Cannot be constructed by the modified code stream
Table 3. Comparative performance of PSNR (dB) for six test images between our method and other schemes.
Table 3. Comparative performance of PSNR (dB) for six test images between our method and other schemes.
SchemeLenaF-16SailboatGirlToysBarbaraAverage
Our scheme32.5932.2230.1633.3032.1228.8231.54
Chiou et al.’s [4]31.0530.2328.4331.1128.7325.5329.18
Celik et al.’s [20]32.5431.3330.4132.7631.1529.8231.34
Tai et al.’s [25]31.6129.8427.2531.4334.8428.4230.57
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chen, Y.-H.; Chang, C.-C.; Lin, C.-C.; Wang, Z.-M. An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference. Appl. Sci. 2021, 11, 635. https://0-doi-org.brum.beds.ac.uk/10.3390/app11020635

AMA Style

Chen Y-H, Chang C-C, Lin C-C, Wang Z-M. An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference. Applied Sciences. 2021; 11(2):635. https://0-doi-org.brum.beds.ac.uk/10.3390/app11020635

Chicago/Turabian Style

Chen, Yan-Hong, Chin-Chen Chang, Chia-Chen Lin, and Zhi-Ming Wang. 2021. "An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference" Applied Sciences 11, no. 2: 635. https://0-doi-org.brum.beds.ac.uk/10.3390/app11020635

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop