Abstract
As the compression technique spread on the Internet, data hiding combining with compression techniques is a hot property in recent years. In this paper, a reversible data hiding (RDH) scheme for Absolute Moment Block Truncation Coding (AMBTC) compressed image is proposed. In the proposed scheme, according to the four kinds of situations which the secret data combine with the bitmap value, we provide some rules to embed data by use the mean value and the absolute moment. Experimental results and analysis demonstrate that, the proposed method can achieve high capacity with low distortion. Besides, the proposed method is very simple and can be easily applied to real-time transmission due to its lower computational complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Ni, Z., Shi, Y., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
Luo, L., et al.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2010)
Li, X.L., Yang, B., Zeng, T.Y.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524–3533 (2011)
Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. Multimed. 15(2), 316–325 (2013)
Qian, Z., Zhang, X.: Improved anti-forensics of JPEG compression. J. Syst. Softw. 91(4), 100–108 (2014)
Chang, C.C., Nguyena, T.Y., Lin, C.C.: A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J. Syst. Softw. 86(2), 389–402 (2013)
Chuang, J.C., Chang, C.C.: Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. Appl. 28(4), 329–333 (2006)
Chen, J., Hong, W., Chen, T.S., Shiu, C.W.: Steganography for BTC compressed images using no distortion technique. Imaging Sci. J. 58(4), 177–185 (2010)
Hong, W., Chen, J., Chen, T.S., Shiu, C.W.: Steganography for block truncation coding compressed images using hybrid embedding scheme. Int. J. Innov. Comput. Inf. Control 7(2), 1–11 (2011)
Ou, D., Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 74(21), 9117–9139 (2015)
Bai, J., Chang, C.C.: A high payload steganographic scheme for compressed images with hamming code. Int. J. Netw. Secur. 18(6), 1122–1129 (2016)
Delp, E.J., Mitchell, O.R.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)
Hong, W., Chen, T.S., Shiu, C.W.: Lossless steganography for AMBTC-compressed images. Int Congr Image Signal Process 2, 13–17 (2008)
Ou, D., Sun, W.: Reversible AMBTC-based secret sharing scheme with abilities of two decryptions. J. Vis. Commun. Image Represent. 25(5), 1222–1239 (2014)
Lin, C.C., Liu, X.L., Tai, W.L., Yuan, S.M.: A novel reversible data hiding scheme based on AMBTC compression technique. Multimed. Tools Appl. 74, 3823–3842 (2015)
Acknowledgments
This research work is partly supported by the National Natural Science Foundation of China (61502009, 61671018, 61472002), China Postdoctoral Science Foundation (2016M591650), Anhui Provincial Natural Science Foundation (1508085SQF216), Key Program for Excellent Young Talents in Colleges and Universities of Anhui Province (gxyqZD2016011), Quality Engineering Program for Colleges and Universities in Anhui Province (2015jyxm042) and Undergraduates Training Foundation of Anhui University (J10118515631, J18520229).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sun, S., Yin, Z., Tang, J., Luo, B. (2017). Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique. In: Chen, F., Luo, Y. (eds) Industrial IoT Technologies and Applications. Industrial IoT 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 202. Springer, Cham. https://doi.org/10.1007/978-3-319-60753-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-60753-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60752-8
Online ISBN: 978-3-319-60753-5
eBook Packages: Computer ScienceComputer Science (R0)