Next Article in Journal
Development of a Method for Evaluating the Technical Condition of a Car’s Hybrid Powertrain
Next Article in Special Issue
Rotational Cryptanalysis of MORUS
Previous Article in Journal
Bessel Collocation Method for Solving Fredholm–Volterra Integro-Fractional Differential Equations of Multi-High Order in the Caputo Sense
Previous Article in Special Issue
PURA-SCIS Protocol: A Novel Solution for Cloud-Based Information Sharing Protection for Sectoral Organizations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility

1
Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion, Fujian Polytechnic Normal University, Fujian Province University, Fuzhou 350300, China
2
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407, Taiwan
3
Department of Electronic Engineering, National Quemoy University, Kinmen 892, Taiwan
*
Authors to whom correspondence should be addressed.
Submission received: 2 November 2021 / Revised: 29 November 2021 / Accepted: 2 December 2021 / Published: 7 December 2021

Abstract

:
Hiding secret data in digital images is an attractive topic in the information security research area. Because the data-embedded stego image looks exactly the same as a regular image, transmitting secret data with stego images does not draw the attention of eavesdroppers, thus fulfilling the goal of information security. Many reversible data hiding (RDH) methods for absolute moment block truncation coding (AMBTC) compressed images have been proposed. These methods hide secret data in an AMBTC-compressed image to produce a stego image and transmit it to the recipient. Upon receiving the stego image, the recipient can extract the secret data and recover the AMBTC-compressed image. In this paper, we propose an RDH scheme for AMBTC-compressed images with an asymmetric embedding rule. Using the AMBTC-compressed version as the basis, the proposed embedding scheme always modifies a pixel value toward its original value with a step size (bitrate) proportional to the gap width. Therefore, the visual quality of the stego image is better than the referred AMBTC version. Additionally, as a result of the adaptive bitrate strategy, the data embedding capacity of the proposed scheme outperforms that of state-of-the-art methods. The security of the resulting stego images was also tested by RS-steganalysis. Experimental results show that the overall performance of the proposed scheme is satisfactory. We revised it, please confirm.

1. Introduction

As a result of the rapid development of the Internet, data may be easily accessed, illegally used, or maliciously tampered with. Recently, in order to address these security issues, many studies have been conducted to investigate two techniques, namely, data encryption and data hiding. Regarding traditional encryption methods such as the RSA cryptosystem, although they can provide a high security level, the encrypted codes may draw the attention of eavesdroppers. To overcome this drawback, data hiding methods have been devoted to hide secret data in ordinary media without changing their original contents [1]. The cover media include images, audio, and videos, among which images are the most often implemented. After embedding secret data into a cover image, the data-embedded image is called a stego image. A data hiding method is reversible when the cover image can be restored after the secret data is extracted from the stego image [2]. In addition to the reversibility, the visual quality of the stego image and the payload containing the secret data are also important features when evaluating the performance of a data hiding method. To hide secret data in a digital image, there are three typical processing domains, namely:
(1)
Spatial domain: The secret data can be embedded into the cover image by simply modifying the pixel values. The least significant-bit (LSB) substitution [3] and the pixel-value difference (PVD) [4] are the most representative methods.
(2)
Frequency domain: The digital image is transformed into frequency coefficients using discrete wavelet transformation (DWT) [5], discrete cosine transformation (DCT) [6], etc. The embedding of data is executed by modifying the frequency coefficients.
(3)
Compression domain: The secret data is embedded in the compressed code of the cover image. Popular compressed codes include vector quantization (VQ) [7], side match vector quantization (SMVQ) [8], Joint Photographic Experts Group (JPEG) [9], and block truncation coding (BTC) [10].
BTC is a simple and effective image compression approach. In 1984 [11], Lema and Mitchell proposed the absolute moment block truncation coding (AMBTC) method, which is an improved version of BTC. AMBTC uses two quantization levels, the low mean and the high mean, instead of the mean value and the variance, to represent an image block. A reversible data hiding (RDH) method for AMBTC compressed images implies that the AMBTC compressed image can be restored after extracting secret data from the stego AMBTC code. The AMBTC-based RDH methods can be roughly classified into five categories [12,13], namely, histogram shifting (HS) [14,15,16,17,18], prediction error expansion (PEE) [19,20,21,22,23,24,25], block classification [26,27,28,29,30], AMBTC reconstructed image [31,32,33], and miscellaneous data hiding [34,35].
The first reversible data hiding method for BTC-compressed images based on HS was proposed by Li et al. [14] in 2011. That method applies HS to embed secret data in high mean and low mean tables. Subsequently, histogram modification methods were proposed [15,16,17,18]. In 2014, Lo et al. [36] proposed an HS-based RDH for BTC-compressed images, where the secret data is embedded into any two tables produced using the quantization levels of all image blocks, according to the user’s choice, using the HS strategy proposed by Ni et al. [37]. To further increase the data embedding capacity and preserve the standard format of AMBTC code, variants of that method were proposed [19,20,21,22,23,24,25]. In 2013, Sun et al. [20] first proposed PEE-based RDH for BTC compressed images, which uses a joint neighbor coding technique to embed the secret data into the high mean and the low mean tables. In 2018, Hong et al. [25] proposed a joint adaptive RDH method for AMBTC-compressed images.
The reversible integer transform is used to represent the quantization levels by their means and differences, thus improving the efficiency of predictive coding. Block classification-based data hiding was first proposed by Chuang and Chang [26], in which each block is classified into smooth and complex blocks based on the difference between two quantization levels. The secret data is embedded by replacing the bitmap of smooth blocks. Subsequently, various RDH algorithms for AMBTC-compressed images were proposed [27,28,29,30].
In this paper, we focus on the RDH method based on AMBTC reconstructed images [31,32,33]; that is, the secret data is embedded by modifying the pixel values of the AMBTC reconstructed image to produce the stego image. After extracting the secret data from the stego image, the AMBTC reconstructed image can be recovered. Earlier methods proposed by Lin et al. [31], Chen et al. [38], and Kim et al. [39] can embed secret data with no more than 16 bits for each embeddable block.
In 2018, Malik et al. [33] proposed an RDH method for AMBTC reconstructed images, which can embed a ternary digit in each embeddable pixel, thus improving the overall embedding capacity of a cover image. In 2020, Lin et al. [40] proposed a two-layer RDH scheme for AMBTC images. In their first layer, each block can be embedded with 16 bits by modifying, at most, one for each embeddable pixel value. In the second layer, each block can be further embedded with 12 or six bits using the hamming code. The total embedding capacity is higher than Malik et al.’s method. In 2021, Lin et al. [41] proposed a new RDH scheme for AMBTC images, which leverages the high correlation of neighboring values in two mean tables to further encode these values and create free space for embedding a secret message.
In 2019, Wang et al. [42] first proposed an adaptive RDH scheme for AMBTC images by using the information of original image. Because the modified pixel values are closer to the original pixel value than the values of the AMBTC version, the visual quality of the stego image is better than the AMBTC reconstructed image. Further, the data embedding bitrate is adaptively determined by the difference between the high mean and low mean of the block. The embedding capacity is therefore greatly improved. Inspired by the idea of Wang et al. [42], we propose a more sophisticated design of the RDH scheme for AMBTC images. For each embeddable pixel, we always embed the secret data by modifying the pixel value toward its original pixel value with an adaptive bitrate proportional to the dynamic distribution of the current block. Thus, the embedding capacity can be further increased. In addition, the error between AMBTC and the original images can be more effectively compensated. The remainder of this paper presents the related work, the proposed scheme, experimental results, and conclusions.

2. Related Work

In this section, the AMBTC image compression technique is briefly introduced. Then, two RDH methods, namely, the methods of Malik et al. [33] and Wang et al. [42] for AMBTC compressed images, are reviewed.

2.1. Absolute Moment Block Truncation Coding (AMBTC)

AMBTC, proposed by Lema and Mitchell in 1984 [11], is an improved version of the block truncation coding for grayscale image compression. The main idea of AMBTC focuses on maintaining the local characteristics of each block, and includes two quantization levels and one bitmap per block. The compression and reconstruction procedure of AMBTC are as follows. First, the original image I is partitioned into n × n blocks { I i } i = 1 : N , where N is the total number of blocks. For each block I i , calculate the mean value by μ i = 1 / ( n × n ) Σ j = 1 : n × n I i , j , where I i , j indicates the j-th pixel of I i . Then, the low mean value L i and the high mean value H i are calculated by:
L i = 1 / N 0   Σ I i , j < μ i I i , j ,
H i = 1 / [ ( n × n ) N 0 ]   Σ I i , j μ i I i , j ,
where N 0 is the number of pixels in the block satisfying I i , j < μ i . An example image block is shown in Figure 1. The mean pixel value of the whole block is 200.6. Pixels valued lower than the mean value are recorded as ‘0’, and the remaining pixels are recorded as ‘1’. In addition, the mean values of the two groups, ‘181’ and ‘221’, are also recorded. In the reconstruction phase, ‘0’s are replaced by the low mean value and ‘1’s are replaced by the high mean value, as shown in the figure.

2.2. Malik et al.’s Method

Malik et al. proposed an RDH scheme for AMBT compressed images [33]. In their data hiding strategy, the blocks with H i L i 2 are identified as non-embeddable blocks, and the first H i and L i are treated as non-embeddable pixels in each block. The secret bits are converted from binary to ternary format. For each embeddable pixel p A i , j , a ternary digit s is embedded according to the following rule:
p A i , j = { p A i , j ,   for   s = 2 , p A i , j 1 ,   for   s = 0 , p A i , j + 1 ,   for   s = 1 .
Based on this symmetric embedding rule, the maximum deviation of the stego pixel value p A i , j is 1, which ensures a good visual quality of the stego image. The recovery of the original compressed image block is straightforward, because the stego pixel values are clearly grouped around the two mean values. However, the total data payload is at a very low level.

2.3. Wang et al.’s Method

In 2019, Wang et al. proposed an adaptive RDH scheme [42] to improve the data hiding capacity of Malik et al.’s method. In their adaptive scheme, the difference between the low mean and the high mean of an image block is calculated by D i = H i L i . The number system of the secret digit to be embedded for each embeddable pixel is determined by the difference value. As the difference value D i increases, the base integer value b also increases. For each embeddable pixel of a block, a secret digit of base b is hidden with a symmetric embedding rule similar to Equation (3). Thus, the payload is adapted to the difference value of the given image block. A relatively complex scheme is designed to embed and extract the secret data while ensuring the reversibility of the original AMBTC compressed block.
Although Wang et al.’s scheme significantly improves the data hiding capacity of the AMBTC-based RDH methods, it suffers from two problems. First, seven different number systems, i.e., b = 2 to 8 , for the secret data are applied, which is complicated to implement because each cover image has a specific distribution of mean tables, and thus has different embedding capacity for the seven number systems. Therefore, the person hiding the data should estimate the embedding capacity of the image for each number system and convert a suitable amount of secret data for them. On the receiver side, the extracted data of different number systems should be converted back into the binary format, which is time consuming.
Secondly, the difference value between the low mean and the high mean does not sufficiently reflect the actual distribution of pixel values in the block. For example, the pixel values approximated by the low mean value may not be evenly distributed around the mean value. For asymmetric distribution of pixel values, an embedding strategy with a more sophisticated design can improve the performance of the data hiding scheme.

3. Proposed Scheme

In this section, we propose a novel RDH scheme for AMBTC-compressed images. More details of the pixel-value distribution of a block are taken into consideration and the secret data is asymmetrically embedded in binary format with an adaptive number of bits. The proposed scheme includes a data embedding phase and a phase of data extraction and image recovery. The details are described below.

3.1. Data Embedding Phase

In the data embedding phase, the cover image I is first divided into 4 × 4 non-overlapping blocks I = { B i i = 1 , 2 , , N } , where N denotes the total number of blocks. The pixel-level representation of the i -th block B i is given by B i = { g i , j j = 1 , 2 , , 16 . } , where g i , j denotes the j -th pixel of the i -th block in the raster scan order. Its AMBTC-compressed code is denoted by C B i = ( H i , L i , B M i ) , where B M i is the bitmap. The reconstructed image block is denoted by I C = { A i i = 1 , 2 , , N } , where A i = { p i , j j = 1 , 2 , , 16 . } is the i -th block. When a block is determined to be embeddable, the secret data is embedded by modifying the reconstructed block A i = { p i , j j = 1 , 2 , , 16 . } into a stego block A ˆ i = { p ^ i , j j = 1 , 2 , , 16 . } . Finally, the stego image is tiled up by the stego blocks and is denoted by I S = { A ˆ i i = 1 , 2 , , N } . To maximize the data payload while preserving good image fidelity, a more sophisticated design of payloads for different situations is illustrated in Figure 2. During the embedding process, the payload of a cover pixel p i , j considers four cases, which are:
(1)
r L i for p i , j = L i and g i , j < L i ,
(2)
r L i + for p i , j = L i and g i , j > L i ,
(3)
r H i for p i , j = H i and g i , j < H i ,
(4)
r H i + for p i , j = H i and g i , j > H i .
The symbol d L i m a x is defined by d L i m a x = m a x j { j | p i , j = L i } | g i , j L i | ; similarly, d H i m a x is defined by d H i m a x = m a x j { j | p i , j = H i } | g i , j H i | . The maximum allowed payload globally is constrained by M e . Thus, the modification of a pixel value p i , j is always toward its original value g i , j in the cover image. In addition, the payload for each case is determined according to the distribution of pixel values in the block. Based on these preliminaries, the flowchart of the data embedding phase is provided in Figure 3. The details are summarized in Algorithm 1.
Algorithm 1. Data embedding algorithm
Input: Grayscale image I , binary secret stream S , maximum pixel payload M e .
Output: Stego image I S = { A ˆ i i = 1 , 2 , , N } , where A ˆ i = { p ^ i , j j = 1 , 2 , , 16 . } .
Step 1: Divide the cover image I into blocks. For each block B i = { g i , j j = 1 , 2 , , 16 . } , apply AMBTC compression to obtain the compressed code C B i = ( H i , L i , B M i ) and the reconstructed image block A i = { p i , j j = 1 , 2 , , 16 . } . Execute the following steps for each block.
Step 2: According to the values of H i and L i , this step considers three cases. Determine the payloads for different situations by:
r L i = r L i + = min ( log 2 d L i max + 1 , log 2 ( H i L i ) , M e ) and
r H i + = r H i = min ( log 2 d H i max + 1 , log 2 ( H i L i ) , M e ) ,
where the maximum deviations d L i max and d H i max are defined by
d L i max = max j { j | p i , j = L i } | g i , j L i | and d H i max = max j { j | p i , j = H i } | g i , j H i | ; the symbol · denotes the floor operation.
  Case 1. H i L i 1 or H i + ( H i L i ) > 255 or L i ( H i L i ) < 0 . The current block is identified as non-embeddable, and the block process is finished.
  Case 2. 2 H i L i 4 : If H i + ( H i L i ) 255 and L i ( H i L i ) 0 , this block is an embeddable simple block. For an embeddable block, the first H i -valued and the first L i -valued pixels in A i are left unchanged. For the reset pixels, apply the following rule to embed one binary secret bit s j and finish the block process:
p ^ i , j = { p i , j ,   for   s j = 0 , p i , j 1 ,   for   s j = 1   and   p i , j = L i , p i , j + 1 ,   for   s j = 1   and   p i , j = H i .  
  Case 3. H i L i > 4 : If H i + ( H i L i ) 255 and L i ( H i L i ) 0 , this block is an embeddable complex block. Determine the payloads for different situations by r L i = r L i + and r H i + = r H i . To avoid overlapping of the inner embedding areas, an additional constraint is given by:
2 r L i + + 2 r H i < H i L i
When the constraint of Equation (5) is not satisfied, r L i + or r H i is decreased by 1 alternatively until satisfied.
Step 3: The first H i -valued and the first L i -valued pixels in A i are left unchanged. For each p i , j of the remaining pixels, determine its payload r i , j by:
r i , j = { 0 ,   for   g i , j = H i   or   g i , j = L i   , r L i ,   for   p i , j = L i   and   g i , j < L i   , r L i + ,   for   p i , j = L i   and   g i , j > L i   , r H i ,   for   p i , j = H i   and   g i , j < H i   , r H i + ,   for   p i , j = H i   and   g i , j > H i   .
Then, embed r i , j bits of secret data s r i , j by:
p ^ i , j = { p i , j ,   for   g i , j = H i   or   g i , j = L i   , p i , j s r i , j ,   for   p i , j = L i   and   g i , j < L i   , p i , j + s r i , j ,   for   p i , j = L i   and   g i , j > L i , p i , j s r i , j ,   for   p i , j = H i   and   g i , j < H i   , p i , j + s r i , j ,   for   p i , j = H i   and   g i , j > H i   .
Step 4: Verify the validity of the embedding result. First, the pixel values should be within the dynamic range 0 p ^ i , j 255 of a grayscale image. Second, the rules for determining H i and L i should be valid. If p i , 1 = L i , H i is determined by scanning j to obtain the first p ^ i , j that satisfies Equation (8); else, p i , 1 = H i , L i is the first p ^ i , j that satisfies Equation (9).
log 2 ( p ^ max p ^ i , j ) + 1 log 2 | p ^ i , j L i | ,
log 2 ( p ^ i , j p ^ min ) + 1 log 2 | H i p ^ i , j | ,
where p ^ max = max j p ^ i , j and p ^ min = min j p ^ i , j .
Step 5: If the H i determined by Equation (8) is not valid, r L i + is decreased by 1 and the process goes back to Step 3; if the L i determined by Equation (9) is not valid, r H i is decreased by 1 and the process goes back to Step 3. If the verification is passed, record the stego block and proceed to the next step.
Step 6: Determine the payload indicator. The payloads for different cases are determined by the distribution of the cover pixel values. When recovering the payloads from a stego block, ambiguity may occur. After embedding, possible versions of payloads are fully searched, and a payload indicator is applied to denote the actual one. The initial estimation is given by the following equations:
r ˜ L i = log 2 ( L i p ^ min ) + 1 ,
r ˜ H i + = log 2 ( p ^ max H i ) + 1 ,
where p ^ max = max j p ^ i , j and p ^ min = min j p ^ i , j . The full search subroutine is given as follows:
    Subroutine 1: Payload Analyzer
     L = 0 .
    For ( 𝕣 L i = r ˜ L i to M e ) {
    For ( 𝕣 L i + = 1 to M e ) {
    For ( 𝕣 H i = 1 to M e ) {
    For ( 𝕣 H i + = r ˜ H i + to M e ) {
      If ( 𝕣 L i + < 𝕣 L i and 𝕣 H i < 𝕣 H i + and 2 𝕣 L i + + 2 𝕣 H i < H i L i and
     n ( p ^ i , j < L i + 2 𝕣 L i + ) + n ( p ^ i , j > H i 2 𝕣 H i ) = 16 ) {
    Record the payload set ( 𝕣 L i ,   𝕣 L i + , 𝕣 H i , 𝕣 H i + ), L = L + 1 . }
    }}}}
where n ( · ) denotes the number of pixels in the stego block that satisfy the condition. A payload indicator N p sized log 2 L is used to indicate the actual payload set applied during embedding, where · is the ceiling operation. This indicator is embedded into the next block.
Step 7: For the last embeddable block, the maximum pixel payload M e and payload indicator N p of its previous block are embedded with a fixed payload version given by Equation (4).
An example of the data embedding process is illustrated in Figure 4. The original block is first compressed into the AMBTC format. The low mean and the high mean are valued at 181 and 221, respectively. Then, the initial values of payloads are calculated, and the secret bits are segmented accordingly. The first stego block generation attempt is given in the figure, where p ^ i , 5 = 212 is not valid. Therefore, the payload r L i + is decreased by 1 and a new attempt is proceeded. After rearranging the secret bits and embedding, the final version of the stego block is generated.

3.2. Data Extraction and Image Recovery Phase

Upon receiving the stego image, it is first divided into blocks of size 4 × 4 . Because the payload indicator of a block is embedded into its next block, the data extraction should process the blocks in reverse order. Thus, a stack data structure is applied. The stego blocks are checked in the raster scan order to obtain the embeddable blocks and are pushed into the waiting stack. Then, these blocks are popped out to extract the secret data. The detail of the data extraction and image recovery is given in Algorithm 2.
Algorithm 2. Data extraction and image recovery algorithm
Input: Stego image I S = { A ˆ i i = 1 , 2 , , N } .
Output: Binary secret stream S , AMBTC-compressed image I C = { A i i = 1 , 2 , , N } .
Step 1: For each stego block A ˆ i , calculate p ^ max = max j p ^ i , j and p ^ min = min j p ^ i , j . If
p ^ max p ^ min 1 , this block is not embeddable. If p ^ max p ^ min 2 , the quantization levels L i and H i should be identified first. The pixel p ^ i , 1 is one of the two quantization levels. If p ^ i , 1 p ^ min < p ^ max p ^ i , 1 , p ^ i , 1 = L i ; else, p ^ i , 1 = H i . Then, apply Equations (8) and (9) to determine the second quantization level. If H i + ( H i L i ) 255 and L i ( H i L i ) 0 , this block is embeddable and put into the waiting stack W A ˆ i of blocks; else, it is not embeddable.
Step 2: Pop the top block W A ˆ i ( K ) out of the waiting stack. The obtained block corresponds to the last embeddable block of the stego image. The last embeddable block is embedded with only one secret bit s j for each embeddable pixel p ^ i , j based on Equation (4). After excluding the first L i -valued and the first H i -valued pixels in A ˆ i , the secret bits can be extracted by:
s j = { 0 ,     p ^ i , j = L i   or   H i , 1 ,     p ^ i , j = L i 1   or   H i + 1 .
The embedded data of the top block W A ˆ i ( K ) includes the maximum pixel payload M e , the payload indicator N p of W A ˆ i ( K 1 ) , and secret bits. The first three bits record the value of M e ( = 2 to 6 ) . If the quantization levels of W A ˆ i ( K 1 ) satisfy 2 H i L i 4 , there is no payload indicator; else, the payload analyzer (Subroutine 1 in Algorithm 1) is applied to analyze the possible payload sets and determine the length log 2 L of the payload indicator. After retrieving M e and N p , the remaining data are secret bits. The original pixel values can be restored by:
p i , j = { L i ,     p ^ i , j L i , H i ,     p ^ i , j H i .
Step 3: For k = K 1   to   1 , consecutively pop out the top block W A ˆ i ( k ) and process the block according to the following two possible cases.
  Case 1. If 2 H i L i 4 , the embedded data are extracted by Equation (12), and the pixel values are restored by Equation (13) as the top block. Then, check the quantization levels of the next block and determine its payload indicator if necessary.
  Case 2. If H k L k > 4 , apply the payload indicator retrieved from the previous block to obtain the pay load set ( r L i ,   r L i + , r H i , r H i + ) of the block. Extract the embedded data using Equation (14) and restore the pixel values by using Equation (15). Note that the secret data s r i , j should be converted back into binary format in its corresponding length of r i , j bits. Then, check quantization levels of the next block and determine its payload indicator if necessary.
s r i , j = {                           0 ,     p ^ i , j = L i   or   H i , L i p ^ i , j ,     p ^ i , j < L i , p ^ i , j L i ,     L i < p ^ i , j L i + 2 r L i + , H i p ^ i , j ,     H i 2 r H i p ^ i , j < H i , p ^ i , j H i ,     p ^ i , j > H i .
p i , j = { L i ,     p ^ i , j L i + 2 r L i + , H i ,     p ^ i , j H i 2 r H i .
Step 4: Combine the secret bits and restored image blocks into binary secret stream S and AMBTC compressed image I C . The overall flowchart is shown in Figure 5.
Figure 5. The flowchart of data extraction and image recovery phase.
Figure 5. The flowchart of data extraction and image recovery phase.
Symmetry 13 02355 g005
To demonstrate the key processing steps of the data extraction and image recovery phase, an example block is given in Figure 6. The two quantization levels L i and H i are determined first. Then, the initial estimation of payloads r ˜ L i and r ˜ H i + are calculated. These parameters are sent to the payload analyzer, together with the maximum payload M e and the payload indicator N p . By applying Subroutine 1 in Algorithm 1, all possible solutions of payload set can be obtained. Only a few combinations can meet the four constraints checked by the analyzer. Therefore, the indicator is usually represented by just a few bits. For the given example, only six combinations of payload sets meet the constraints, and three bits are applied to record the indicator. If the indicator is N p = 000 , the first solution ( 4 ,   4 ,   2 ,   2 ) is the actual payload set. Accordingly, the embedded secret data and the cover pixel-values can be recovered using Equations (14) and (15).

4. Experimental Results

In this section, the performance of the proposed scheme is evaluated and compared with state-of-the-art methods. In addition, the security of our scheme under steganalysis is also assessed. We took eight test images from the USC-SIPI Image Database [43], namely, ‘Lena’, ‘Airplane’, ‘Zelda’, ‘Boat’, ‘Baboon’, ‘Peppers’, ‘House’, and ‘Couple’, which are shown in Figure 7. In addition, our scheme was applied to 10,000 images in the BOWS2 dataset [44]. The platform for conducting the experiments was a PC with an Intel®® Core™ i7-8750H CPU @ 2.20 GHz and 16 GB RAM with MATLAB R2014b. The secret bits were randomly generated. The embedding capacity (EC) and peak signal to noise radio (PSNR) were used to evaluate the performance of our proposed scheme. The visual quality of the images denoted by PSNR is defined by:
P S N R = 10   log 10 255 × 255 1 W × H i = 1 w j = 1 H ( p i , j p ^ i , j ) 2
where p i , j and p ^ i , j represent the pixel value of the cover image and the stego image, respectively; the constants W and H are the width and the height of the cover image, respectively.

4.1. Performance of the Proposed Scheme

To assess the performance of our scheme under different maximum payload settings, we applied the maximum payload M e of 2 bits to 6 bits. All experimental data for the eight test images are listed in Table 1. The first row is the PSNR values of the AMBTC compressed images with respect to their original cover images. It is a common principle that the PSNR value of a compressed image is lower when the texture of the original image is more complex. The image ‘Baboon’ is the most complex image among the eight test samples, and therefore the PSNR value of its AMBTC compressed image is the lowest. For each maximum payload value, we list the PSNR, the total embedding capacity E C total , and the amount of auxiliary information I aux required to record the payload indicators, where E C total and I aux are measured in total number of bits for a test image. The net data embedding capacity E C net of an image can be calculated by subtracting I aux from E C total . As shown in the table, the PSNR value of the stego images increases with increasing payload and reaches a maximum at 3 bits or 4 bits. Further increasing the maximum payload degrades the visual quality of the stego images. Among the eight test images, the total embedding capacity of the image ‘Baboon’ is the highest, which is a notably different result from those of the current existing data hiding methods.
The executions time required for all test images under different maximum allowed payloads are listed in Table 2. Because the optimal M e for most test images is 4 bits, the practical execution time can be seen in the row of M e = 4 . The typical execution time of the proposed scheme is within 10 sec.

4.2. Comparison with Related Works

The performance of our scheme was compared with five existing AMBTC-based data hiding methods, namely, those of Wang et al. [42], Lin et al. [40], Malik et al. [33], Chen et al. [38], and Kim et al. [39]. Table 3 lists the PSNR and embedding capacity for the eight test images, where the maximum payload setting of our scheme is M e = 4 . Referring to the PSNR values of AMBTC compressed images provided in Table 1, the PSNR values of the methods of Lin et al. [40], Malik et al. [33], Chen et al. [38], and Kim et al. [39] slightly degrade after embedding. Only the proposed scheme and Wang et al.’s method [42] improved the PSNR value after embedding. Further, the proposed scheme outperformed the related works both in embedding capacity and visual quality. The evolution of PSNR value with increasing payload are plotted in Figure 8, where M e = 4 for our scheme. As the number of utilized blocks increases with the payload, the PSNR value increases. The proposed scheme is based on the AMBTC compressed version of an image block. The modification of the pixel value due to embedding is always toward the original pixel value. Therefore, the visual quality of the stego image is better than the AMBTC compressed version.
To further investigate the generalizability of the related works, the BOW2 dataset [44], which consists of 10,000 test images, was applied. For each of the related methods, we plot the envelope of PSNR values with respect to embedding capacity in Figure 9; that is, we fully embedded each test image to determine its PSNR value. Then, the PSNR values of all test images were quantized into equally spaced values. For each quantized PSNR value, we plot the maximum, minimum, and mean values within its corresponding category. For each method, the average values of EC and PSNR for 10,000 test images are listed below the figure. As shown in the figure, the proposed scheme outperformed the related works both in average EC and in average PSNR value. Some of the test images in the dataset can be embedded with more than 3 bpp, which is much greater than the compared methods.

4.3. Steganalysis

To estimate the security level of the stego images generated by our proposed scheme, RS steganalysis [45] was applied. In the RS steganalysis, we first divided the image into non-overlapping blocks. Then, a discrimination function f, a flipping function F, and a mask M = [0 1; 1 0] were defined to obtain three types of pixel blocks: regular blocks, singular blocks, and unusable blocks. The percentages of regular and singular blocks for mask M are denoted by RM and SM. When the mask is −M, the values RM and SM can be obtained similarly. A secure stego image should have its RM very close to RM and SM very close to SM. To make it easier to observe the overall performance, we defined the index p by combining the two absolute differences as:
p = ( | R M R M | + | S M S M | ) ( R M + S M )
The value of p can be treated as the percentage deviation with respect to its absolute value; when p is less than five percent (0.05) the stego image is less likely to be suspected. Table 4 lists the RS steganalysis results of the related works. As shown in the table, the p values of all methods are small enough such that the stego images can be treated as secure. The best performances achieved among the six methods for all test images are highlighted with bold figures.
Another commonly applied steganalysis technique is the pixel value differencing histogram (PDH) analysis proposed by Zhang and Wang [46], which is applied to detect the pixel value differencing (PVD)-based data hiding. When secret data is embedded by PVD, the pairwise difference of pixels is expanded and the peak in PDH is degraded. The PDH analysis of the proposed scheme for the practical parameter of M e = 4 is given in Figure 10, where the PDH of stego images still preserves a significant peak. Of course, the degradation of peak value is proportional to the amount of embedded data.

5. Conclusions

This paper proposed an RDH scheme for AMBTC-compressed images with an adaptive bitrate. The data embedding for each image block is based on the AMBTC-compressed version. Each pixel value of an AMBTC block is compared with its corresponding pixel value in the original block. The embedding process always modifies the pixel value toward the original value with a bitrate proportional to the gap width. Therefore, the proposed scheme can produce a stego image with a better visual quality than the AMBTC-compressed version. The proposed scheme outperforms state-of-the-art methods both in visual quality of the stego images and the embedding capacity of secret data. The resulting stego images were tested by RS steganalysis, and the experimental data proves the high security level of the proposed scheme.
Digital images in compressed formats are more applicable than conventional bitmap images. Development of RDH schemes for compressed digital images is a promising research topic and more application fields will be found.

Author Contributions

Conceptualization, C.-C.C.; Data curation, J.L.; Formal analysis, J.L.; Funding acquisition, J.L.; Methodology, J.L. and J.-H.H.; Project administration, C.-C.C.; Supervision, C.-C.C.; Validation, J.-H.H.; Visualization, J.-H.H.; Writing—original draft, J.L.; Writing—review & editing, J.-H.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Natural Science Foundation of Fujian Province under Grant 2021J011236, and in part by the Education and Scientific Research Foundation of Fujian Province under Grant JA15575.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, S.; Leung, K.; Cheng, L.M.; Chan, C.K. A novel image-hiding scheme based on block difference. Pattern Recognit. 2006, 39, 1168–1176. [Google Scholar] [CrossRef]
  2. Hong, W.; Chen, T.S.; Chen, J. Reversible data hiding using delaunay triangulation and selective embedment. Inf. Sci. 2015, 308, 140–154. [Google Scholar] [CrossRef]
  3. Chan, C.K.; Cheng, L.M. Hiding data in images by simple lsb substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
  4. Wu, D.C.; Tsai, W.H. A steganographic method for images by pixel value differencing. Pattern Recogn. Lett. 2003, 24, 1613–1626, 2003. [Google Scholar] [CrossRef]
  5. Zhang, D.X.; Pan, Z.; Li, H. A contour-based semi-fragile image watermarking algorithm in dwt domain. In Proceedings of the Second International Workshop on Education Technology and Computer Science, Wuhan, China, 6–7 March 2010; Volume 3, pp. 228–231. [Google Scholar]
  6. Wu, X.; Sun, W. Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl. Soft Comput. 2013, 13, 1170–1182. [Google Scholar] [CrossRef]
  7. Gray, R.M. Vector quantization. IEEE Assp. Mag. 1984, 1, 4–29. [Google Scholar] [CrossRef]
  8. Kim, T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process. 1992, 1, 170–185. [Google Scholar] [CrossRef] [PubMed]
  9. Wang, K.; Lu, Z.M.; Hu, Y.J. A high capacity lossless data hiding scheme for jpeg images. J Syst. Softw. 2013, 86, 1965–1975. [Google Scholar] [CrossRef]
  10. Delp, E.J.; Mitchell, O.R. Image compression using block truncation coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
  11. Lema, M.; Mitchell, O. Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
  12. Kumar, R.; Kim, D.S.; Jung, K.H. Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J. Inf. Secur. Appl. 2019, 47, 94–103. [Google Scholar] [CrossRef]
  13. Kumar, R.; Jung, K. A systematic survey on block truncation coding based data hiding techniques. Multimed. Tools Appl. 2019, 78, 32239–32259. [Google Scholar] [CrossRef]
  14. Li, C.H.; Lu, Z.M.; Su, Y.X. Reversible data hiding for btc-compressed images based on bitplane flipping and histogram shifting of mean tables. Inf. Technol. J. 2011, 10, 1421–1426. [Google Scholar] [CrossRef] [Green Version]
  15. Lin, C.; Liu, X. A reversible data hiding scheme for block truncation compressions based on histogram modification. In Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, Washington, DC, USA, 25–28 August 2012; pp. 157–160. [Google Scholar]
  16. Chang, C.I.; Hu, C.Y.; Chen, L.W.; Lu, C.C. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process. 2015, 108, 376–388. [Google Scholar] [CrossRef]
  17. Li, F.; Bharanitharan, K.; Chang, C.C.; Mao, Q. Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images. Multimed. Tools Appl. 2016, 75, 16153–16171. [Google Scholar] [CrossRef]
  18. Lin, C.C.; Chang, C.C.; Wang, Z.M. Reversible data hiding scheme using adaptive block truncation coding based on an edge-based quantization approach. Symmetry 2019, 11, 765. [Google Scholar] [CrossRef] [Green Version]
  19. Wang, K.; Hu, Y.; Lu, Z. Reversible data hiding for block truncation coding compressed images based on prediction-error expansion. In Proceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Washington, DC, USA, 18–20 July 2012; pp. 317–320. [Google Scholar]
  20. Sun, W.; Lu, Z.M.; Wen, Y.C.; Yu, F.X.; Shen, R.J. High performance reversible data hiding for block truncation coding compressed images. Signal. Image Video Process. 2013, 7, 297–306. [Google Scholar] [CrossRef]
  21. Hong, W.; Ma, Y.B.; Wu, H.C. An efficient reversible data hiding method for AMBTC compressed images. Multimed. Tools Appl. 2017, 76, 5441–5460. [Google Scholar] [CrossRef]
  22. Tsai, Y.Y.; Chan, C.S.; Liu, C.L.; Su, B.R. A reversible steganographic algorithm for btc-compressed images based on difference expansion and median edge detector. Imaging Sci. J. 2014, 62, 48–55. [Google Scholar] [CrossRef]
  23. Chang, C.C.; Chen, T.S.; Wang, Y.K.; Liu, Y.J. A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive or operator. Multimed. Tools Appl. 2018, 77, 9039–9053. [Google Scholar] [CrossRef]
  24. Hong, W. Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry 2018, 10, 36. [Google Scholar] [CrossRef] [Green Version]
  25. Hong, W.; Zhou, X.Y.; Weng, S.W. Joint adaptive coding and reversible data hiding for AMBTC compressed images. Symmetry 2018, 10, 254. [Google Scholar] [CrossRef] [Green Version]
  26. Chuang, J.-C.; Chang, C.-C. Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. App. 2006, 28, 1735–1743. [Google Scholar]
  27. Ou, D.; Sun, W. High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 2015, 74, 9117–9139. [Google Scholar] [CrossRef]
  28. Huang, Y.H.; Chang, C.C.; Chen, Y.H. Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed. Tools Appl. 2017, 76, 6159–6174. [Google Scholar] [CrossRef]
  29. Chen, Y.Y.; Chi, K.Y. Cloud image watermarking: High quality data hiding and blind decoding scheme based on block truncation coding. Multimed. Tools Appl. 2017, 25, 1–13. [Google Scholar] [CrossRef]
  30. Kumar, R.; Kumar, N.; Jung, K. A New Data Hiding Method Using Adaptive & Quantization Dynamic Bit Plane Based AMBTC. In Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 7–8 March 2019; pp. 854–858. [Google Scholar]
  31. Lin, C.C.; Liu, X.L.; Tai, W.L.; Yuan, S.M. A novel reversible data hiding scheme based on AMBTC compression technique. Multimed. Tools Appl. 2015, 74, 3823–3842. [Google Scholar] [CrossRef]
  32. Pan, J.; Li, W.; Lin, C.C. Novel reversible data hiding scheme for AMBTC-compressed images by reference matrix. In Proceedings of the MISNC 2014, Kaohsiung, Taiwan, 13–14 September 2014; pp. 427–436. [Google Scholar]
  33. Malik, A.; Sikka, G.; Verma, H.K. An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim. Syst. Sign. Process. 2018, 4, 1801–1818. [Google Scholar] [CrossRef]
  34. Chang, C.C.; Liu, Y.J.; Nguyen, S.T. A novel data hiding scheme for block truncation coding compressed images using dynamic programming strategy. In Proceedings of the Sixth International Conference on Graphic and Image Processing (ICGIP 2014), Beijing, China, 24–26 October 2014. [Google Scholar]
  35. Lin, J.; Lin, C.C.; Chang, C.C. Reversible steganographic scheme for AMBTC-compressed image based on (7, 4) hamming code. Symmetry 2019, 11, 1236–1252. [Google Scholar]
  36. Lo, C.C.; Hu, Y.C.; Chen, W.L.; Wu, C.M. Reversible data hiding scheme for btc-compressed images based on histogram shifting. Int. J. Secur. Its Appl. 2014, 8, 201–314. [Google Scholar] [CrossRef]
  37. Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  38. Chen, Y.-Y.; Hsia, C.-H.; Jhong, S.Y.; Lin, H.-J. Data hiding method for AMBTC compressed images. J. Ambient Intell. Humaniz. Comput. 2018, 12, 1–9. [Google Scholar] [CrossRef]
  39. Kim, C.; Shin, D.; Leng, L.; Yang, C.-N. Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Process. 2016, 14, 101–114. [Google Scholar] [CrossRef]
  40. Lin, J.; Weng, S.; Zhang, T.; Ou, B.; Chang, C.C. Two-layer reversible data hiding based on AMBTC image with (7, 4) hamming code. IEEE Access 2020, 8, 21534–21548. [Google Scholar] [CrossRef]
  41. Lin, C.-C.; Nguyen, T.-S.; Chang, C.-C.; Chang, W.-C. Efficient Reversible Data Hiding Scheme for AMBTC-Compressed Images. Appl. Sci. 2021, 11, 6741. [Google Scholar] [CrossRef]
  42. Wang, X.; Chang, C.C.; Lin, C.C. Adaptive reversible data hiding scheme for AMBTC compressed images. Multimed. Tools Appl. 2019, 78, 1–22. [Google Scholar] [CrossRef]
  43. The USC-SIPI Image Database. Available online: http//sipi.usc.edu/database (accessed on 3 December 2021).
  44. The bows2 Image Database. Available online: http://bows2.ec-lille.fr/ (accessed on 3 December 2021).
  45. Fridrich, J.; Goljan, M. Practical steganalysis of digital images—State of the art. Proc. SPIE 2002, 4675, 1–13. [Google Scholar]
  46. Zhang, X.; Wang, S. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett. 2004, 3, 331–339. [Google Scholar] [CrossRef]
Figure 1. AMBTC compression of an example image block.
Figure 1. AMBTC compression of an example image block.
Symmetry 13 02355 g001
Figure 2. Illustration of the asymmetric payloads for different situations.
Figure 2. Illustration of the asymmetric payloads for different situations.
Symmetry 13 02355 g002
Figure 3. Flowchart of the data embedding phase.
Figure 3. Flowchart of the data embedding phase.
Symmetry 13 02355 g003
Figure 4. An example block of the data embedding phase.
Figure 4. An example block of the data embedding phase.
Symmetry 13 02355 g004
Figure 6. An example block of the data extraction and image recovery phase.
Figure 6. An example block of the data extraction and image recovery phase.
Symmetry 13 02355 g006
Figure 7. Eight test images from USC-SIPI Image Database. (a) Lena; (b) Airplane; (c) Zelda; (d) Boat. (e) Baboon; (f) Peppers; (g) House; (h) Couple.
Figure 7. Eight test images from USC-SIPI Image Database. (a) Lena; (b) Airplane; (c) Zelda; (d) Boat. (e) Baboon; (f) Peppers; (g) House; (h) Couple.
Symmetry 13 02355 g007
Figure 8. PSNR value under different payloads for the eight test images. (a) Lena; (b) Airplane; (c) Zelda; (d) Boat; (e) Baboon; (f) Peppers; (g) House; (h) Couple.
Figure 8. PSNR value under different payloads for the eight test images. (a) Lena; (b) Airplane; (c) Zelda; (d) Boat; (e) Baboon; (f) Peppers; (g) House; (h) Couple.
Symmetry 13 02355 g008aSymmetry 13 02355 g008b
Figure 9. PSNR value under different payloads for the BOWS2 dataset. (a) EC av = 0.48 ( bpp ) ,   PSNR av = 33.34 ( dB ) ; (b) EC av = 0.98 ( bpp ) ,   PSNR av = 33.35 ( dB ) ; (c) EC av = 1.06 ( bpp ) ,   PSNR av = 33.25 ( dB ) ; (d) EC av = 1.45 ( bpp ) ,   PSNR av = 33.25 ( dB ) ; (e) EC av = 1.45 ( bpp ) ,   PSNR av = 34.13 ( dB ) ; (f) EC av = 1.49 ( bpp ) ,   PSNR av = 34.86 ( dB ) .
Figure 9. PSNR value under different payloads for the BOWS2 dataset. (a) EC av = 0.48 ( bpp ) ,   PSNR av = 33.34 ( dB ) ; (b) EC av = 0.98 ( bpp ) ,   PSNR av = 33.35 ( dB ) ; (c) EC av = 1.06 ( bpp ) ,   PSNR av = 33.25 ( dB ) ; (d) EC av = 1.45 ( bpp ) ,   PSNR av = 33.25 ( dB ) ; (e) EC av = 1.45 ( bpp ) ,   PSNR av = 34.13 ( dB ) ; (f) EC av = 1.49 ( bpp ) ,   PSNR av = 34.86 ( dB ) .
Symmetry 13 02355 g009aSymmetry 13 02355 g009b
Figure 10. The PDH analysis of the proposed RDH scheme for M e = 4 . (a) Lena; (b) Airplane; (c) Zelda; (d) Boat; (e) Baboon; (f) Peppers; (g) House; (h) Couple.
Figure 10. The PDH analysis of the proposed RDH scheme for M e = 4 . (a) Lena; (b) Airplane; (c) Zelda; (d) Boat; (e) Baboon; (f) Peppers; (g) House; (h) Couple.
Symmetry 13 02355 g010
Table 1. Performance of the proposed scheme under different maximum payload settings.
Table 1. Performance of the proposed scheme under different maximum payload settings.
M e IndexLenaAirplaneZeldaBoatBaboonPeppersHouseCouple
AMBTC PSNR   ( dB ) 33.2031.9536.6531.1526.9833.3930.9731.25
2 bits PSNR   ( dB ) 34.0032.5337.8031.8927.6234.1631.6732.01
E C total 337,288269,619352,196405,711449,879373,508327,067407,157
I aux 82847124754112,00815,812916710,41212,449
3 bits PSNR   ( dB ) 34.5533.1038.2632.5028.3134.6834.6832.65
E C total 412,628339,543408,053518,738636,204445,277438,344527,937
I aux 598661824781840713,255623894549670
4 bits PSNR   ( dB ) 34.9433.6438.2332.9329.0435.0132.9133.01
E C total 448,478379,679425,999572,612769,462473,714502,890584,645
I aux 494962443878688910,869603585949059
5 bits PSNR   ( dB ) 34.6733.5537.9332.6528.7734.7032.6032.68
E C total 459,152396,503428,531589,454830,456477,889524,053596,546
I aux 47756304384165487809632981739558
6 bits PSNR   ( dB ) 34.4333.0737.9532.3628.4034.4132.3732.39
E C total 457,000393,257428,578585,323831,316473,162521,128590,635
I aux 49705916384370408084605179029884
Table 2. Execution time of the proposed RDH scheme under different maximum payloads.
Table 2. Execution time of the proposed RDH scheme under different maximum payloads.
Time (S)LenaAirplaneZeldaBoatBaboonPeppersHouseCouple
M e = 25.5015.3635.6185.5585.6295.5895.1985.575
M e = 36.4655.9886.5686.1385.7976.4565.9016.153
M e = 49.1058.1849.4867.9986.4198.9387.2137.966
M e = 515.23613.13416.21312.5878.57515.18710.99012.578
M e = 627.09622.69730.08823.52214.20027.17618.69022.273
Table 3. Comparison with related works.
Table 3. Comparison with related works.
MethodFactorLenaAirplaneZeldaBoatBaboonPeppersHouseCouple
Proposed
(Me = 4 bit)
PSNR (dB)34.9433.6438.2332.9329.0435.0132.9133.01
E C total (bits)443,529373,435422,121565,723758,593467,679494,296575,586
Wang et al.’s
method [42]
PSNR (dB)33.9432.5437.5331.8427.6334.0831.6531.95
E C total   (bits)396,751375,342389,829457,180540,770415,660429,914465,444
Lin et al.’s
method [40]
PSNR (dB)33.0331.8336.2631.0226.9333.1930.8731.13
E C total (bits)426,246395,638436,735448,606458,077442,876412,315449,560
Malik et al.’s
method [33]
PSNR (dB)33.1031.8436.4131.0726.9633.2630.8831.15
E C total (bits)362,088328,981363,397362,754363,419363,441310,054363,508
Chen et al.’s
method [38]
PSNR (dB)33.1431.8636.4831.0926.9633.2930.8931.17
E C total (bits)262,000254,178262,144262,065262,144262,144241,072262,129
Kim et al.’s
method [39]
PSNR (dB)33.1331.8636.4631.1026.9733.2930.9031.18
E C total (bits)161,485151,266159,270155,491151,293159,416134,569156,431
Table 4. Comparison under RS steganalysis.
Table 4. Comparison under RS steganalysis.
Methods LenaAirplaneZeldaBoatBaboonPeppersHouseCoupleAverage
Proposed R M 0.64180.71860.64840.56450.49970.62040.65900.6978
R M 0.64400.72100.63960.56490.49480.62640.65860.6911
S M 0.23750.18170.22630.30320.37150.25530.23520.1976
S M 0.24050.18150.23680.30220.37240.24810.23300.2018
p 0.00600.00290.02200.00160.00670.01510.00290.00820.0083
Malik et al.’s method [33] R M 0.71450.76630.70950.67370.63780.71670.74310.7223
R M 0.71230.75930.70820.68500.63900.69730.74800.7217
S M 0.17880.14040.17870.20680.23930.18000.15730.1756
S M 0.17670.14650.17850.20400.24220.18670.15770.1744
p 0.00500.01440.00170.01600.00460.02910.00580.00890.0101
Kim et al.’s method [39] R M 0.80900.85020.81750.79390.75520.81540.83580.8154
R M 0.81140.85330.82010.78500.75450.82120.84160.8180
S M 0.10710.08100.09870.12170.15470.10340.09480.1071
S M 0.10470.08030.09960.12250.15090.10190.08820.1072
p 0.00530.00400.00380.01060.00500.00790.01330.00210.0059
Chen et al.’s method [38] R M 0.60560.66580.59690.54690.48410.58460.63130.6410
R M 0.59220.66720.60580.53980.48360.59280.62870.6459
S M 0.25720.21440.26750.31500.38100.27700.24670.2436
S M 0.26610.21970.25820.32050.37720.27240.25050.2443
p 0.02590.00750.02110.01460.00490.01500.00730.04060.0157
Lin et al.’s method [40] R M 0.68080.71290.68440.65350.62420.67680.69460.6884
R M 0.67770.70770.67680.65700.60770.68020.68250.6926
S M 0.20690.17920.19990.23030.25550.21410.19940.2018
S M 0.20960.18500.20760.22280.27400.20790.20620.2000
p 0.00650.01220.01740.01250.03970.01090.02120.01310.0147
Wang et al.’s method [42] R M 0.72790.76760.72030.67920.61420.72110.72340.7464
R M 0.72680.76090.72740.67680.62430.72110.72400.7387
S M 0.16730.14380.16900.20710.26530.17460.17350.1576
S M 0.17100.14650.16580.21270.25780.17280.17630.1632
p 0.00530.01030.01160.00900.02010.00200.00380.00720.0096
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lin, J.; Chang, C.-C.; Horng, J.-H. Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility. Symmetry 2021, 13, 2355. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13122355

AMA Style

Lin J, Chang C-C, Horng J-H. Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility. Symmetry. 2021; 13(12):2355. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13122355

Chicago/Turabian Style

Lin, Juan, Chin-Chen Chang, and Ji-Hwei Horng. 2021. "Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility" Symmetry 13, no. 12: 2355. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13122355

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop