Skip to main content
Log in

Data hiding method for AMBTC compressed images

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the current growth of multimedia applications, a substantial amount of visual data, including images and videos, is transmitted daily, making information forensics and security essential. Thus, protecting secret data from attackers is critical. In this work, we propose a AMBTC-based data-hiding method, in which secret data are concealed in individual image blocks that are compressed using absolute moment block truncation coding technique. By placing high or low mean values at the corner of each block, the secret data are then extracted reversibly and the original host image can be recovered at the decoding end. In addition, the quality of stego images is maintained, which protects the embedded visual data from the suspicion of attackers. From the experimental results, we show that the proposed method outperforms other state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Bhowmik D, Oakes M (2016) Visual attention-based image watermarking. IEEE Access 4:80028018

    Article  Google Scholar 

  • Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and histogram shifting. IEEE Trans Inf Forensics Secur 8:111120

    Article  Google Scholar 

  • Coltuc D (2011) Improved embedding for predictionbased reversible watermarking. IEEE Trans Inf Forensics Secur 6:873882

    Article  Google Scholar 

  • Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27:13351342

    Article  Google Scholar 

  • Fallahpour M, Megias D, Ghanbari M (2011) Reversible and high-capacity data hiding in medical images. IET Image Process 5:190197

    Article  Google Scholar 

  • Han J, Zhao X, Qiu C (2016) A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Humaniz Comput 7:3745

    Article  Google Scholar 

  • Huynh N, Bharanitharan K, Chang C, Liu Y (2018) Minima-maxima preserving data hiding algorithm for absolute block truncation coding compressed images. Multimed Tools Appl 77:57675783

    Article  Google Scholar 

  • Kim C, Shin D, Leng L, Yang C (2016) Lossless data hiding for absolute moment block truncation coding. J Real Time Process 14:114

    Google Scholar 

  • Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32:11481157

    Article  Google Scholar 

  • Li F, Bharanitharan K, Chang C, Mao Q (2015a) Bistretch reversible data hiding algorithm for absolute moment truncation coding compressed images. Multimed Tools Appl 75:1615316171

    Google Scholar 

  • Li X, Zhang G, Zhang X (2015b) Image encryption algorithm with compound chaotic maps. J Ambient Intell Humaniz Comput 6:563570

    Article  Google Scholar 

  • Lin C, Liu X, Tai W, Yuan S (2015) A novel reversible data hiding scheme based on ambtc compression technique. Multimed Tools Appl 74:38233842

    Article  Google Scholar 

  • Lin C, Liu X, Tang J, Luo B (2017) Improved reversible data hiding scheme based on ambtc compression technique. In: Proceedings of the international conference on Industrial IoT Technologies and Applications, pp 111–118

  • Lo C, Hu Y, Chen W, Wu C (2014) Reversible data hiding scheme for btc-compressed images based on histogram shifting. Int J Secur Appl 8:301314

    Google Scholar 

  • Martino F, Sessa S (2018) Fragile watermarking tamper detection via bilinear fuzzy relation equations. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0806-3

    Article  Google Scholar 

  • Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16:354362

    Google Scholar 

  • Qin C, Chang C, Chiu Y (2014) A novel joint datahiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23:969978

    Article  Google Scholar 

  • Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z

    Article  Google Scholar 

  • Suri S, Vijay R (2018) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0825-0

    Article  Google Scholar 

  • Wang S, Li C, Kuo W (2013) Reversible data hiding based on two-dimensional prediction errors. IET Image Process 7:805816

    Article  ADS  Google Scholar 

  • Zareian M, Tohidypour H (2013) Robust quantization index modulation-based approach for image watermarking. IET Image Process 7:432441

    Article  Google Scholar 

  • Zeng L, Ren W, Chen Y, Lei M (2017) LMDGW: a novel matrix based dynamic graph watermark. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0657-3

    Article  Google Scholar 

  • Zhang W, Hu X, Li X, Yu N (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22:27752785

    Google Scholar 

  • Zhou Z, Wu M, Yang C, Sun X, Pan Z (2017) Coverless image steganography using histograms of oriented gradients-based hashing algorithm. J Internet Technol 18:1177–1184

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Ministry of Science and Technology (MOST 106-2221-E-027-063-).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yung-Yao Chen.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, YY., Hsia, CH., Jhong, SY. et al. Data hiding method for AMBTC compressed images. J Ambient Intell Human Comput 14, 14785–14793 (2023). https://doi.org/10.1007/s12652-018-1048-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1048-0

Keywords

Navigation