Advertisement

High Capacity Data Hiding Based on AMBTC and Interpolation

  • Cheonshik KimEmail author
  • Dongkyoo Shin
  • Ching-Nung Yang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)

Abstract

Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for developing data hiding schemes. All the existing techniques demonstrated steady performance. To further improve performance, in this paper, we present a method to extend the cover image using the neighbor mean interpolation (NMI) method, and improve data hiding performance based on this extended cover image and AMBTC. Experimental results show that our framework is superior in terms of existing BTC-based data hiding function and concealment efficiency.

Keywords

Data hiding NMI BTC AMBTC DBS 

Notes

Acknowledgments

This research was supported in part by Ministry of Science and Technology (MOST), under Grant 107-2221-E-259-007-. This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2018R1D1A1B07047395), National Research Foundation of Korea (NRF) funded by (2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255).

References

  1. 1.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)CrossRefGoogle Scholar
  2. 2.
    Yang, C.N., Hsu, S.C., Kim, C.: Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 50, 209–215 (2017)CrossRefGoogle Scholar
  3. 3.
    Kim, C., Shin, D., Yang, C.N., Chou, Y.S.: Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming+k. Digit. Signal Process. 78, 284–293 (2018)CrossRefGoogle Scholar
  4. 4.
    Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)CrossRefGoogle Scholar
  5. 5.
    Huang, F., Qu, X., Kim, H.J., Huang, J.: Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1610–1621 (2016)CrossRefGoogle Scholar
  6. 6.
    Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13, 285–287 (2006)CrossRefGoogle Scholar
  7. 7.
    Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2004)CrossRefGoogle Scholar
  8. 8.
    Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768–2786 (2007)CrossRefGoogle Scholar
  9. 9.
    Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2002)CrossRefGoogle Scholar
  10. 10.
    Bergman, C., Davidson, J.: Unitary embedding for data hiding with the SVD. In: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 21 March 2005.  https://doi.org/10.1117/12.587796
  11. 11.
    Delp, E.J., Mitchell, O.R.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)CrossRefGoogle Scholar
  12. 12.
    Hong, W., Chen, T.S., Shiu, C.W.: Lossless steganography for AMBTC compressed images. In: Proceedings of 1st International Congress on Image and Signal Processing, Sanya, China, vol. 2, pp. 13–17 (2008)Google Scholar
  13. 13.
    Chuang, J.C., Chang, C.C.: Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. Appl. 28(4), 329–333 (2006)Google Scholar
  14. 14.
    Chen, J., Hong, W., Chen, T.S., Shiu, C.W.: Steganography for BTC compressed images using no distortion technique. Imaging Sci. J. 58, 177–185 (2010)CrossRefGoogle Scholar
  15. 15.
    Hong, W., Chen, J., Chen, T.S., Shiu, C.W.: Steganography for block truncation coding compressed images using hybrid embedding scheme. Int. J. Innov. Comput. Inf. Control 7, 733–743 (2011)Google Scholar
  16. 16.
    Ou, D., Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 74, 9117–9139 (2015)CrossRefGoogle Scholar
  17. 17.
    Huang, Y.H., Chang, C.C., Chen, Y.H.: Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed. Tools Appl. 76, 6159–6174 (2017)CrossRefGoogle Scholar
  18. 18.
    Hong, W.: Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry 10(2), 1–18 (2018)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7, 176–184 (2012)CrossRefGoogle Scholar
  20. 20.
    Jung, K.H., Yoo, K.Y.: Data hiding method using image interpolation. Comput. Stand. Interfaces 31(2), 465–470 (2009)CrossRefGoogle Scholar
  21. 21.
    Image database ref. http://sipi.usc.edu/database/database.php?volume=misc. Accessed 31 May 2018
  22. 22.
    Bai, J., Chang, C.C.: A high payload steganographic scheme for compressed images with hamming code. Int. J. Netw. Secur. 18, 1122–1129 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer EngineeringSejong UniversitySeoulRepublic of South Korea
  2. 2.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan, R.O.C.

Personalised recommendations