Next Article in Journal
Fibre-Microbial Curing Tests and Slope Stability Analysis
Previous Article in Journal
Unveiling the Performance of Nickel-Titanium Endodontic Instruments through Multimethod Research: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images

1
Department of Computer Science & Information Engineering, Asia University, Taichung 41354, Taiwan
2
Department of Information System, University of Bengkulu, Bengkulu 38122, Indonesia
3
Department of Information Management, National Taichung University of Science and Technology, Taichung 41354, Taiwan
4
Department of Information Management, Lunghwa University of Science and Technology, Taoyuan 33306, Taiwan
5
Department of Medical Research, China Medical University Hospital, China Medical University, Taichung 404333, Taiwan
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(12), 7050; https://doi.org/10.3390/app13127050
Submission received: 13 April 2023 / Revised: 29 May 2023 / Accepted: 7 June 2023 / Published: 12 June 2023
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
The rapid development of digital multimedia has resulted in a massive storm of large-scale data. The data compression method reduces data size and lowers transmission costs. As a result, data-hiding research in the compression domain poses significant challenges to researchers. This work proposes a highly imperceptible data-hiding scheme for a compressed absolute moment block truncation coding (AMBTC) image. The proposed method addresses the shortcomings of the current block-based AMBTC data-hiding scheme, with an incredibly complex block as non-embedding. This is because embedding in complex blocks causes substantial distortions in the image, resulting in low imperceptibility performance. Combination theory was implemented to ensure the high imperceptibility of the modified compressed images. The experimental findings proved that the proposed method achieved high imperceptibility and high hiding capacity by modifying one pixel in a block to embed confidential bits.

1. Introduction

A massive storm of large-scale data has come from the accelerated development of digital multimedia. Various applications produce images, audio, and videos daily. The security of critical data and the gigantic volume of data are the two major issues this trend has brought forth. To enhance the confidentiality of data transmission, the sender encrypts the data using conventional cryptographic techniques or imperceptibly transfers data using data-hiding techniques [1,2,3]. At the same time, the best way to minimize the data size and lower transmission costs is to use a data compression technique [4]. Inevitably, data-hiding research in the compression domain presents a immense challenge to academics because it is essential to balance the hiding capacity with compressed image quality.
Data hiding is defined as an imperceptible method of hiding confidential data inside other media i.e., digital images, videos, and audio. An image-data-hiding scheme can be categorized into three domains [5] namely the spatial domain, the frequency domain, and the compressed domain. In order to embed confidential data, the spatial domain method directly modifies the image pixel [6,7,8]. It causes low imperceptibility. On the other side, the frequency domain method hides the confidential data into transformed coefficients. Lastly, the compressed domain method manages the confidential messages in the compressed codes of digital images. Both the frequency domain and the compressed domain perform better imperceptibility than the spatial domain.
In general, two metrics are used to assess the performance of a data-hiding technique. The first is hiding capacity. Hiding capacity is identified as the quantity of confidential data concealed in a cover media. The second metric is imperceptibility. Imperceptibility is defined as the level of image quality after modification. The primary issue in data-hiding research is that the higher the hiding capacity, the lower the imperceptibility.
Along with the big data age, where the volume and variety of data are abundant, compression technology is experiencing advancements. Data compression technology is efficient in data transmission. This is due to the fact that computing is simple and inexpensive. There are several widely used compression methods, including vector quantization (VQ) [9,10,11,12], block truncation coding (BTC) [13,14,15,16], AMBTC [17,18], and JPEG compression [19,20,21], beginning with Delp and Mitchell [13] in 1979, who proposed block truncation coding (BTC) for image compression, and then further developed in 1984 by Lema and Mitchell [17], whose method is known as absolute moment block truncation coding (AMBTC). AMBTC offers simpler computation than BTC and acquires better image quality.
Due to the benefits of the compression technique, data-hiding research is evolving into compression domain data hiding. Researchers have used the AMBTC compressed image-data-hiding method [22,23,24,25,26,27,28,29,30,31]. In 2020, Horng et al. published a data-hiding scheme for AMBTC compressed images utilizing quotient value differencing (QVD) and least significant bit (LSB) replacement [23]. In the same year, Lee et al. [22] presented a reversible data-hiding method based on Turtle Shell for AMBTC-compressed images. The following year, in 2021, Lin et al. [23] proposed a data-hiding scheme that employs the difference value of higher and lower quantizers. The three methods are block classification based on data hiding. After performing AMBTC encoding, this method divides the sub-blocks into smooth or complex ones based on a pre-defined threshold. Complex blocks are non-embedding blocks that cannot embed the secret bits. Otherwise, smooth blocks are defined as embeddable blocks in which a certain number of secret bits can be embedded. These methods provide lower computation complexity and achieved accepted image quality.
Moreover, these methods benefit smooth images because they achieve higher embedding capacity. However, these methods are not applicable to complex images because they cannot embed confidential messages in a complex image. Embedding in the complex block distorts the image and results in low imperceptible performance for the data-hiding method.
Based on the concerns above, this research proposes an innovative data-hiding scheme for AMBTC-compressed images based on combination theory. The paper’s main contributions are highlighted in the following:
i.
Non-block classification. In the proposed scheme, all blocks are embeddable. The threshold value is not established because there is no specification for a smooth and complex block.
ii.
High embedding capacity in the complex block. By utilizing the concept of combination theory, the proposed scheme can embed at least four secret bits resulting in higher embedding capacity in the complex block compared with the related works.
iii.
High imperceptible AMBTC data hiding. By applying the concept of combination theory, the proposed scheme only needs to change 1 bit of pixel to embed 4 secret bits. Hence, it has advantages for complex images.
The remainder of this work is structured as follows. Section 2 provides an overview of the related study. Our proposed data-hiding method is described in Section 3. Section 4 contains the findings of the experiments. Section 5 finally presents the conclusions.

2. Related Works

2.1. Absolute Moment Block Truncation Coding (AMBTC)

In 1984, AMBTC was introduced by Lema and Mitchell [17]. The main steps of AMBTC consist of encoding and decoding procedures and are explained in detail as follows:
The Encoding Procedure
Step 1. Segment the images into a collection of t × t non-overlapping blocks.
Step 2. Calculate the mean μ and the standard deviation α by using (1) and (2), respectively. Assume that p i j is the value of pixel in the block’s position (i, j).
μ = 1 t × t i = 1 t j = 1 t p i j
α = j = 1 t × t p i j 2 μ 2 t × t
Step 3. Create the bitmap value b m = m i j | m i j 0,1 , 1 i , j t by using (3):
m i j = 1 , i f p i j μ 0 , i f p i j < μ
The Decoding Procedure
Step 1. Calculate two quantizers, i.e., high quantizer hq and low quantizer lq, using (4) and (5), respectively.
h q = μ α q t × t q
l q = μ + α t × t q q
where q is the quantity of p i j which is greater than or equal to the mean value μ.
Step 2. Create the reconstructed block r m = r i j | r i j h q , l q , 1 i , j k by using (6):
r m i j = h q , i f m i j = 1 l q , i f m i j = 0
In order to provide a detailed understanding of the AMBTC compression method, we provide a numerical example as follows. Figure 1 depicts the illustration of AMBTC. First, Figure 1a depicts the original image block size of 4 × 4. Next, we computed the block means μ and standard deviation α by using (1) and (2), respectively. In this example, the value of μ = 78 and α = 19. Next, we generate the bitmap in the encoding procedure using (3). The result is shown in Figure 1b. Finally, we calculate the higher and lower quantization levels, hq and lq, using (4) and (5), respectively. In this example, hq = 105 and lq = 62. Finally, the reconstructed image block generated in the decoding procedure using (6) is shown in Figure 1c.

2.2. Combination Theory

Wu et al. [32] introduced a novel data-hiding method for binary images using combination theory in 2017. In their method, senders can hide more than one bit of confidential data by modifying one pixel at a maximum in one block. The experimental result presented by Wu et al.’s scheme [32] increases the embedding capacity and reduces the distortion of the modified image.
The main procedure of Wu et al.’s scheme [32] is as follows:
Step 1. Calculate the block maximum payload by (7):
b = log 2 ( u × v + 1
Step 2. Develop a hidden location matrix P as described in [32].
Step 3. Produce the new computed hidden location matrix P’ by P ⊗ Gi.
Then, using Algorithm 1, calculate the total number T(Sr, r = 1, 2,…, b) of each bit of confidential data that exists in P’.
Algorithm 1: Confidential Data Calculation
FOR p = 1 :u; q = 1 : v
   IF P’x,y hasSr
     T(Sr) = T(Sr) +1
   END
END
Step 4. Calculate the residual value S’r for the total amount of instances of each bit Sr by modulo as in (8):
S r = T S r m o d 2 , w h e r e r = 1= , 2 , , b
Step 5. Investigate the original confidential data Sr to the feature value S’r by (9), which consists of Sr such that Sr ≠ S’r
S = S r ( S r S r )
Step 6. Conceal the confidential data into a block Gi by changing only one pixel of Gi according to Algorithm 2.
Algorithm 2: Confidential Data Embedding
FOR p = 1: u; q = 1: v
   IF Px,y= S”
     IF Gi (p,q) = 1
       Gi (p,q) = 0
     ELSE
       Gi (p,q) = 1
     END
   END
END

2.3. Block-Classification-Based RDH for AMBTC-Compressed Images

Lee et al. [22], Horng et al. [23], and Lin et al. [24] presented a block-based data-hiding scheme for AMBTC-compressed images. The classification is applied in the sub-block of the image by utilizing a pre-defined threshold. The threshold is used to classify whether the sub-block is smooth or complex. When the sub-block is smooth, then it is called an em-beddable block. This means the secret bits can be embedded in the block. Otherwise, when the block is complex, it is called a non-embedding block. This means that the secret bits cannot be embedded in the block. The threshold value is varies depending on the needs of the user. When the user needs to embed more secret bits, a high threshold value is set. However, the higher embedding capacity affects the image quality. The way of carrying out block classification of three related works is presented in Table 1.

3. The Proposed Method

Inspired by Wu et al.’s scheme [32], in this paper, we propose an innovative data-hiding scheme for AMBTC image compression based on combination theory. Figure 2 shows the flowchart of the proposed data-hiding scheme, consisting of image compression and data embedding. The proposed scheme involves embedding and extracting procedures. Section 3.1 provides the embedding procedures, while Section 3.2 presents the extracting procedures.

3.1. The Embedding Procedures

In this part, we present the procedures of concealing confidential data into the compressed image using a hidden position matrix which was generated by combination theory. Our proposed embedding procedure is explained in depth as follows.
Input: An original image TI, with R width and S height, and confidential data S.
Output: Compressed stego image TI’.
Given an original image TI, with R width and S height, segment into the n×n non-overlapping block image.
Step 1. Compress the original image block to obtain the bitmap value, Bm, according to Section 2.1.
Step 2. Embed the confidential data S into the bitmap Bm according to Section 2.2.
An example is given to further describe the proposed scheme for better understanding.
Input: Suppose we have a block size of 4 × 4 pixels of an image. The block consists of the original pixel values (44, 61, 72, 58, 74, 65, 79, 62, 127, 93, 75, 56, 112, 117, 103, and 60}). The confidential data stream S that must be concealed is (1101)2.
Step 1. Compress the original image block by using the AMBTC method. Figure 3 is the AMBTC encoding of the given pixel value.
Step 2. Embed the confidential data bits into a bitmap by implementing combination theory as explained in Section 2.1. Figure 4 depicts the secret matrix generation which a multiplication operation between bitmap and secret position matrix P. Therefore, Figure 5 shows the secret matrix calculation of each A, B, C and D in the new secret position matrix P’. For every sum value of A, B, C and D, which are 3, 3, 4 and 6 respectively the mod 2 operation is managed for resulting S’r as S’r = (1100).
Moreover, as Sr ≠ S’r, 1101 ≠ 1100 then S” = (ABCD) ⊙ ((1101) ⊕ (1100)) = (ABCD) ⊙ (0001) = D. Figure 6 depicts the final result of the embedding procedures, which consisting the original bitmap, stego bitmap, reconstructed original image and reconstructed stego image.

3.2. The Extraction Procedures

The extraction procedures are performed to retrieve confidential data. Our proposed extraction procedure is explained in depth below.
Step 1. Calculate the new matrix P = P G i where p x , y = P x , y × G i ( x , y ) for all p = 1, 2,…, u, and q = 1, 2,…, v.
Step 2. Calculate the total amount of each confidential data bit T S r , r = 1 , 2 , , k in the new matrix P’ using Algorithm 3.
Algorithm 3: Confidential Data Calculation
FOR p = 1: u ; q = 1: v
   IF P’x,y hasSr
     T(Sr) = T(Sr) +1
   END
END
Step 3. Reassemble the confidential data bit S r = S r 0,1 , r = 1,2 , , b , using (10).
S r = T ( S r ) m o d 2
Here is an example of an extraction procedure to provide an in-depth understanding. The stego image generated from the embedding procedures in Section 3.1 consists of the pixel following values (62, 62, 62, 105, 62, 62, 105, 105, 105, 105, 62, 62, 105, 105, 105, and 62). Thus, the bitmap value G i are (0, 0, 0, 1, 0, 0, 1, 1, 1, 1, 0, 0, 1, 1, 1, and 0). Moreover, the known matrix P values are (A, B, C, D, AB, AC, AD, BC, BD, CD, ABC, ABD, BCD, ACD, ABCD, and A). Therefore, the step-by-step extraction is as follows:
Step 1. Calculate the new matrix P = P G i . Figure 7 depicts the new matrix P’ calculation which an operation between bitmap and matrix P.
Step 2. Calculate the total amount of each confidential data bit T S r , r = 1 , 2 , , k in the new matrix P’. Figure 8 shows the confidential data bit calculation which a sum operation of each A, B, C and D in the new matrix P’.
Step 3. Reassemble the confidential data bit.
S 1 = 3   m o d   2 = 1
S 2 = 3   m o d   2 = 1
S 3 = 4   m o d   2 = 0
S 4 = 7   m o d   2 = 1
Finally, the confidential data stream S extracted is (1101)2.

4. Experimental Results

4.1. The Environment and Parameters

We performed extensive experiments to determine the efficacy of our proposed data-hiding technique. An assessment was conducted to determine the hiding capacity and imperceptibility. We utilized the common test grayscale images, known as airplane, baboon, boat, Lena, and peppers, as shown in Figure 9a–e, respectively. All of the test images are 512 × 512 pixels in size. We performed binary confidential data which were produced by a pseudo-random number generator. The experimental test runs on Windows 10 Home Single Language with an Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz 1.99 GHz. Furthermore, all programs were generated and executed in MATLAB 9.8 (R2020a). The hiding capacity is identified by the number of bits, while the imperceptibility is identified by image quality. To assess image quality, the commonly used parameter is the peak signal-to-noise ratio (PSNR) as defined in Equation (11).
P S N R = 10 log 10 255 2 M S E
The mean square error (MSE) is defined in Equation (12).
M S E = 1 N × N i = 1 N j = 1 N ( T I i j T I i j ) 2
where T I i j is the pixel in position of the i-th row and the j-th column of image T I , and T I i j is the pixel in the i-th row and the j-th column image T I
  •  
Figure 9. Image testing: (a) airplane; (b) baboon; (c) boat; (d) Lena; and (e) pepper.
Figure 9. Image testing: (a) airplane; (b) baboon; (c) boat; (d) Lena; and (e) pepper.
Applsci 13 07050 g009

4.2. Results and Discussion

The experimental findings are presented in Table 2, where the PSNRs, MSEs, and hiding capacity are shown. For the proposed scheme, in terms of hiding capacity, the highest hiding capacity is 201,364 for the image of Lena. While the lowest hiding capacity is 104,284, as experienced by the image of the baboon. On average, the hiding capacity is 171,529. This means 60% of the test images exceed the average hiding capacity. This indicated that the proposed scheme proved to have a high hiding capacity.
Furthermore, regarding image quality, the experimental results provided excellent findings, whereby all the PSNR values of the test images are above 35.89 dB. The highest PSNR value was shown by the image of the airplane, 38.25 dB. It is widely accepted knowledge in image data-hiding that when the PSNR value of an image exceeds 30 db, image modifications remain undetectable. Therefore, the findings proved that the proposed scheme has high imperceptibility.
Further testing was performed by comparing the proposed scheme to those developed by Lee et al. [22], Horng et al.’s scheme, and Lin et al.’s scheme. The main reason for comparing these three schemes is to find the appropriate scheme for embedding a secret message in the complex block. That is why the predefined threshold is equal to 0. The performance comparison of the proposed scheme and others’ schemes can be seen in Table 2 and Figure 9.
As seen in Table 2, Lee et al.’s scheme’s PSNR value for all test images is lower than the proposed scheme. The difference is 5dB overall. This pattern is proportional to the value of the MSE. As the higher the MSE, the lower the PSNR is. Nevertheless, Lee et al.’s approach produces adequate image quality because all their PSNRs are more than 30 dB. The notable difference is in the number of embedded bits. As demonstrated in Figure 10, the proposed method has double the hiding capacity of Lee et al.’s approach. This demonstrates that the proposed approach is highly advantageous for complex images.
The second comparison is against Horn et al.’s scheme. As presented in Table 2, the most significant difference in the PSNR value is experienced by the baboon image, 26.39 dB and 37.97 dB for Lee et al.’s scheme and the proposed scheme, respectively. It has been proven that the imperceptibility of the proposed scheme is outstanding. Figure 10 depicts the strange trend of the MSE baboon image value, which corresponds to the PSNR value. This is because the PSNR value is relatively low, precisely 26 dB; therefore, the MSE is very high, 149.30. Moreover, Figure 10 illustrates the most exciting trend regarding hiding capacity in the baboon image. In terms of hiding capacity, as demonstrated in Figure 10, the proposed method has double the hiding capacity of Horng et al.’s approach.
The last comparison is to Lin et al.’s scheme. As seen in Table 2, the pattern of Lin et al.’s scheme is generally similar to Horng et al.’s scheme. However, regarding image quality, Lin et al.’s scheme is better than Horng et al.’s. Conversely, Horng et al.’s scheme can embed more secret bits than Lin et al.’s. Finally, from the above discussion, it can be proven that the proposed scheme performs better than the three other schemes for handling the complex block. The proposed scheme is highly invisible and has the most excellent hiding capacity.

5. Conclusions

With combination theory, this paper proposed a highly imperceptible data-hiding method in AMBTC-compressed images. The proposed scheme is a non-block-classification-based scheme, as no predefined threshold is set to classify the block into smooth and complex. All the blocks are embeddable. The embedding strategy utilizes combination theory. The proposed scheme can embed at least 4 bits in a block using combination theory. The proposed scheme can achieve higher hiding capacity even in complex images. Moreover, by only modifying 1 bit in a block, the proposed scheme proved to be highly imperceptible. This is a very fundamental requirement for data hiding in the compressed domain.
Further, our proposed scheme performs well with a practical and low-computation algorithm. The experimental results show that the proposed scheme satisfied the modified compressed image quality and had a high hiding capacity. Moreover, the proposed scheme performs better than related schemes, especially in complex images.
For further development, our proposed scheme can be very effective and adopted appropriately in medical imaging for securing electronic patient information because our proposed scheme induces invisible modification of image quality.

Author Contributions

The authors’ contribution to this manuscript is stated as follows: conceptualization: K.A.; methodology: K.A.; software: S.-F.C.; validation: N.-I.W.; formal analysis: N.-I.W.; investigation: S.-F.C.; data curation: S.-F.C.; writing—original draft preparation: K.A.; writing—review and editing: M.-S.H.; project administration: M.-S.H.; funding acquisition: M.-S.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Ministry of Science and Technology (Taiwan), grant numbers MOST 109-2221-E-468-011-MY3, MOST 108-2410-H-468-023, and MOST 108-2622-8-468-001-TM1. The APC was funded by the Ministry of Science and Technology (Taiwan).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alhomoud, A.M. Image steganography in spatial domain: Current status, techniques, and trends. Intell. Autom. Soft Comput. 2021, 27, 69–88. [Google Scholar] [CrossRef]
  2. Min-allah, N.; Nagy, N.; Aljabri, M.; Alkharraa, M.; Alqahtani, M.; Alghamdi, D.; Sabri, R.; Alshaikh, R. Quantum Image Steganography Schemes for Data Hiding: A Survey. Appl. Sci. 2022, 12, 10294. [Google Scholar] [CrossRef]
  3. Anggriani, K.; Wu, N.; Hwang, M. Research on Coverless Image Steganography. Int. J. Netw. Secur. 2023, 25, 25–31. [Google Scholar] [CrossRef]
  4. Dorobant, A.; Brad, R. Improving Lossless Image Compression with Contextual Memory. Appl. Sci. 2019, 9, 2681. [Google Scholar] [CrossRef] [Green Version]
  5. Saleh, S.Q. Digital Image Steganalysis: Current Methodologies and Future Challenges. IEEE Access 2022, 10, 92321–92336. [Google Scholar] [CrossRef]
  6. Wang, Y.L.; Shen, J.J.; Hwang, M.S. A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 2018, 20, 801–804. [Google Scholar] [CrossRef]
  7. Wang, Y.L.; Shen, J.J.; Hwang, M.S. An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching. Int. J. Netw. Secur. 2017, 19, 858–862. [Google Scholar] [CrossRef]
  8. Lee, C.F.; Shen, J.J.; Wu, C.Y. Overlapping Difference Expansion Reversible Data Hiding. Int. J. Netw. Secur. 2023, 25, 201–211. [Google Scholar]
  9. Linde, Y. An Algorithm for Vector Quantizer Design. IEEE Trans. Commun. 1980, 28, 84–95. [Google Scholar] [CrossRef] [Green Version]
  10. Chiranjeevi, K.; Jena, U.R. Image compression based on vector quantization using cuckoo search optimization technique. Ain Shams Eng. J. 2018, 9, 1417–1431. [Google Scholar] [CrossRef] [Green Version]
  11. Chavan, P.P.; Rani, B.S.; Murugan, M.; Chavan, P. An image compression model via adaptive vector quantization: Hybrid optimization algorithm. Imaging Sci. J. 2020, 68, 259–277. [Google Scholar] [CrossRef]
  12. Wang, Y.L.; Shen, J.J.; Hwang, M.S. A Survey of Reversible Data Hiding for VQ-Compressed Images. Int. J. Netw. Secur. 2018, 20, 1–8. [Google Scholar] [CrossRef]
  13. Robert, O.; Mitchell, J.; Delp, E. Image Compression Using Block Truncation Coding. IEEE Trans. Commun. 1979, 27, 1335–1341. [Google Scholar]
  14. Somasundaram, K. Efficient Block Truncation Coding. Int. J. Comput. Sci. Eng. 2010, 2, 2163–2166. [Google Scholar]
  15. Yang, C.-N.; Chou, Y.-C.; Chang, T.-K.; Kim, C. An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme. Appl. Sci. 2020, 10, 7340. [Google Scholar] [CrossRef]
  16. Sau, K.; Kumar, R.; Chanda, A. Image Compression based on Block Truncation Coding using Clifford Algebra. Procedia Technol. 2013, 10, 699–706. [Google Scholar] [CrossRef] [Green Version]
  17. Lema, M.D.; Mitchell, R. Absolute Moment Block Truncation Coding and Its Application to Color Images. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
  18. Lai, P.C.; Shen, J.J.; Chou, Y.C. High Embedding Capacity Data Hiding Technique Based on Hybrid AMBTC and LSB Substitutions. Int. J. Netw. Secur. 2023, 25, 221–234. [Google Scholar]
  19. Perfilieva, I.; Hurtik, P. The F-transform preprocessing for JPEG strong compression of high-resolution images. Inf. Sci. 2021, 550, 221–238. [Google Scholar] [CrossRef]
  20. Mancini, L.; Kourousias, G.; Velez, A.; Barrera, J.F.; Bredies, K.; Holler, M. Developed JPEG Algorithm Applied in Image Compression Developed JPEG Compression Algorithm Applied in Image. IOP Conf. Ser. Mater. Sci. Eng. 2020, 928, 062015. [Google Scholar] [CrossRef]
  21. Hamano, G.; Imaizumi, S. Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors 2023, 23, 3400. [Google Scholar] [CrossRef]
  22. Lee, C.-F.; Chang, C.-C.; Li, G. A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. KSII Trans. Internet Inf. Syst. 2020, 14, 2554–2575. [Google Scholar] [CrossRef]
  23. Horng, J.-H.; Chang, C.; Li, G.-L. Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images. IEEE Access 2020, 8, 129347–129358. [Google Scholar] [CrossRef]
  24. Lin, C.; Nguyen, T.; Chang, C.; Chang, W. Efficient Reversible Data Hiding Scheme for AMBTC-Compressed Images. Appl. Sci. 2021, 11, 6741. [Google Scholar] [CrossRef]
  25. Kim, C. Separable Reversible Data Hiding in Encrypted AMBTC Images Using Hamming Code. Appl. Sci. 2022, 12, 8225. [Google Scholar] [CrossRef]
  26. Kim, C.; Shin, D.; Yang, C. Data Hiding Method for Color AMBTC Compressed Images Using Color Difference. Appl. Sci. 2021, 11, 3418. [Google Scholar] [CrossRef]
  27. Kim, C. Dual Reversible Data Hiding Based on AMBTC Using Hamming Code and LSB Replacement. Electronics 2022, 11, 3210. [Google Scholar] [CrossRef]
  28. Lin, C.; Lin, J.; Chang, C. Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding. Electronics 2021, 10, 281. [Google Scholar] [CrossRef]
  29. Anggriani, K.; Wu, N.; Hwang, M. Research on Data Hiding Schemes for AMBTC Compressed Images. Int. J. Netw. Secur. 2022, 24, 1114–1123. [Google Scholar] [CrossRef]
  30. Chen, Y.; Chang, C.; Lin, C.; Wang, Z. An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference. Appl. Sci. 2021, 11, 635. [Google Scholar] [CrossRef]
  31. Anggriani, K.; Chiou, S.; Wu, N.; Hwang, M. A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments. Electronics 2023, 12, 395. [Google Scholar] [CrossRef]
  32. Wu, N.; Hwang, M. Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images. Displays 2017, 49, 116–123. [Google Scholar] [CrossRef]
Figure 1. An example of AMBTC compression images: (a) original pixel value; (b) bitmap; and (c) compressed pixel value.
Figure 1. An example of AMBTC compression images: (a) original pixel value; (b) bitmap; and (c) compressed pixel value.
Applsci 13 07050 g001
Figure 2. Flowchart of the proposed scheme.
Figure 2. Flowchart of the proposed scheme.
Applsci 13 07050 g002
Figure 3. AMBTC encoding: (a) original pixel value and (b) bitmap.
Figure 3. AMBTC encoding: (a) original pixel value and (b) bitmap.
Applsci 13 07050 g003
Figure 4. Secret position matrix generation: (a) bitmap; (b) secret position matrix P; and (c) new secret position matrix P’.
Figure 4. Secret position matrix generation: (a) bitmap; (b) secret position matrix P; and (c) new secret position matrix P’.
Applsci 13 07050 g004
Figure 5. Secret matrix calculation: (a) SUM of (A) highlighted in red; (b) SUM of (B) highlighted in yellow; (c) SUM of (C) highlighted in green; and (d) SUM of (D) highlighted in blue.
Figure 5. Secret matrix calculation: (a) SUM of (A) highlighted in red; (b) SUM of (B) highlighted in yellow; (c) SUM of (C) highlighted in green; and (d) SUM of (D) highlighted in blue.
Applsci 13 07050 g005
Figure 6. Final result: (a) original bitmap; (b) stego bitmap; (c) reconstructed original image; and (d) reconstructed stego image, the changed values are shown in purple.
Figure 6. Final result: (a) original bitmap; (b) stego bitmap; (c) reconstructed original image; and (d) reconstructed stego image, the changed values are shown in purple.
Applsci 13 07050 g006
Figure 7. New matrix P calculation: (a) bitmap; (b) matrix P; and (c) new matrix P’.
Figure 7. New matrix P calculation: (a) bitmap; (b) matrix P; and (c) new matrix P’.
Applsci 13 07050 g007
Figure 8. Confidential data bit calculation: (a) SUM of (A) highlighted in red; (b) SUM of (B) highlighted in yellow; (c) SUM of (C) highlighted in green; and (d) SUM of (D) highlighted in blue.
Figure 8. Confidential data bit calculation: (a) SUM of (A) highlighted in red; (b) SUM of (B) highlighted in yellow; (c) SUM of (C) highlighted in green; and (d) SUM of (D) highlighted in blue.
Applsci 13 07050 g008
Figure 10. Graphic of the performance comparison: (a) image quality comparison and (b) hiding capacity comparison [22,23,24].
Figure 10. Graphic of the performance comparison: (a) image quality comparison and (b) hiding capacity comparison [22,23,24].
Applsci 13 07050 g010
Table 1. The rules for block classification.
Table 1. The rules for block classification.
Lee et al.’s Scheme [22] Horng et al.’s Scheme [23]Lin et al.’s Scheme [24]
Complex Blockdifference value D = |hqlq| > THdifference value D = ||hqlq| > THdifference value D = ||hqlq|≤ 2m
Smooth Blockdifference value D = ||hqlq|≤ THdifference value D = ||hqlq|≤ THdifference value D = ||hqlq| > 2m
hq is the high quantizer, lq is the low quantizer, and m is the length of the binary representation of difference value D.
Table 2. Performance comparison with related works.
Table 2. Performance comparison with related works.
ImageMetricsLee et al.’s Scheme TH = 0 [22]Horng et al.’s Scheme TH = 0 [23]Lin et al.’s Scheme TH = 0 [24]Proposed Scheme
AirplanePSNR33.6331.6531.9538.25
MSE28.2244.4741.509.72
Capacity95,255114,66681,097195,928
BaboonPSNR30.8826.3926.0037.97
MSE53.12149.30163.3310.36
Capacity83,060126,60064,882104,284
BoatPSNR31.6830.5931.1536.27
MSE44.1156.7649.8915.34
Capacity83,240115,44878,178158,440
LenaPSNR33.4831.4233.9737.42
MSE29.1546.7826.0611.76
Capacity91,190124,87775,128201,364
PepperPSNR32.6731.7233.4035.89
MSE35.1843.7629.7216.72
Capacity83,600125,65778,799197,632
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Anggriani, K.; Chiou, S.-F.; Wu, N.-I.; Hwang, M.-S. High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images. Appl. Sci. 2023, 13, 7050. https://doi.org/10.3390/app13127050

AMA Style

Anggriani K, Chiou S-F, Wu N-I, Hwang M-S. High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images. Applied Sciences. 2023; 13(12):7050. https://doi.org/10.3390/app13127050

Chicago/Turabian Style

Anggriani, Kurnia, Shu-Fen Chiou, Nan-I Wu, and Min-Shiang Hwang. 2023. "High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images" Applied Sciences 13, no. 12: 7050. https://doi.org/10.3390/app13127050

APA Style

Anggriani, K., Chiou, S. -F., Wu, N. -I., & Hwang, M. -S. (2023). High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images. Applied Sciences, 13(12), 7050. https://doi.org/10.3390/app13127050

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop