Next Article in Journal
Effect of Link Misalignment in the Optical-Internet of Underwater Things
Next Article in Special Issue
Specific Emitter Identification Based on Synchrosqueezing Transform for Civil Radar
Previous Article in Journal
Energy-Efficient Ternary Multipliers Using CNT Transistors
Previous Article in Special Issue
Improved 2D Coprime Array Structure with the Difference and Sum Coarray Concept
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

High-Capacity Data Hiding for ABTC-EQ Based Compressed Image

1
Department of Computer Engineering, Sejong University, Seoul 05006, Korea
2
Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien 97401, Taiwan
3
Key Laboratory of Jiangxi Province for Image Processing and Pattern Recognition, Nanchang Hangkong University, Nanchang 330063, China
4
School of Electrical and Electronic Engineering, College of Engineering, Yonsei University, Seoul 120749, Korea
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Electronics 2020, 9(4), 644; https://doi.org/10.3390/electronics9040644
Submission received: 27 February 2020 / Revised: 26 March 2020 / Accepted: 8 April 2020 / Published: 14 April 2020
(This article belongs to the Special Issue Theory and Applications in Digital Signal Processing)

Abstract

:
We present a new data hiding method based on Adaptive BTC Edge Quantization (ABTC-EQ) using an optimal pixel adjustment process (OPAP) to optimize two quantization levels. The reason we choose ABTC-EQ as a cover media is that it is superior to AMBTC in maintaining a high-quality image after encoding is executed. ABTC-EQ is represented by a form of t r i o ( Q 1 , Q 2 , [ Q 3 ] , BM) where Q is quantization levels ( Q 1 Q 2 Q 3 ) , and BM is a bitmap). The number of quantization levels are two or three, depending on whether the cover image has an edge or not. Before embedding secret bits in every block, we categorize every block into smooth block or complex block by a threshold. In case a block size is 4x4, the sixteen secret bits are replaced by a bitmap of the smooth block for embedding a message directly. On the other hand, OPAP method conceals 1 bit into LSB and 2LSB respectively, and maintains the quality of an image as a way of minimizing the errors which occur in the embedding procedure. The sufficient experimental results demonsrate that the performance of our proposed scheme is satisfactory in terms of the embedding capacity and quality of an image.

1. Introduction

The Internet is deeply involved in everyday life and work; most work is actively introducing Internet-based cloud services in modern society. This means that personal and corporate data will no longer be stored only on personal computers. Accordingly, security issues for digital data are becoming more important. The watermark may be copyright information and authentication information to determine the copyright owner of the work, to authenticate the authenticity and integrity of the multimedia work, and to achieve the purpose of copyright protection. Digital watermarking technology has several features such as digital media protection, authentication, distribution, and anti-counterfeiting. Therefore, the research in this area is important [1].
While data hiding (DH) [2] is a method to transmit information to the destination secretly by embedding information in cover media. Unlike existing communication methods, a hidden exchange is secure communication. Thus, DH has a potential for safety communication. DH does not replace encryption, but it may be a safety personal communication when it cannot be detect by attackers. If the cover image embeds secret data, the cover image is distorted and cannot be recovered. In some applications, such as military imaging systems and remote sensing, it is desirable to restore the stego media back to the original media without distortion. The DH that has this feature of reversibility is called reversible DH (RDH) [3].
DH may be classified into two technologies in the spatial domain and the frequency (or transform) domain. In the spatial domain, the secret message is embedded into the pixels of the cover image directly. DH based on the Least Significant Bit (LSB) [4,5,6] is mainly used in the spatial domain. In the frequency domain, the cover image must first be transformed using Discrete Cosine Transform (DCT) [7,8] Discrete Wavelet Transform (DWT) or similar frequency-oriented mechanisms, and then secret message is embedded in such a transformed domain [9]. Vector Quantization (VQ) [10] and block truncation coding (BTC) [11] are lossy compression methods, and many DH methods based on the compressions have been proposed.
After BTC, lossy compression methods such as Absolute Moment Block Truncation Coding (AMBTC) [12,13,14], Modified BTC (MBTC) [15], and Adaptive BTC based on Edge Quantization (ABTC-EQ) [16] with improved performance appeared. These compression methods also have the advantages of a stable compression ratio and low computation time, which are suitable for wide use in DH and watermarking. The compressed basic structure of AMBTC is t r i o ( Q 1 , Q 2 , BM), where Q 1 and Q 2 are two quantization levels, and BM is a bitmap. Here, a is less than b. One of the most efficient methods in AMBTC-based DH is to embed secret data directly into the bit-plane. Chuang and Chang [17] introduced a way to embed data using Direct Bitmap Substitution (DBS). Here, a suitable condition to embed secret data is to use smooth blocks rather than complex blocks because it helps to maintain good image quality.
Chen et al. [18] introduced a method of the Order of Two Quantization Levels (OTQL) to embed data into t r i o compressed using AMBTC without loss. They may hinder the loss of the stego block by using OTQL and flipped bitmap BM. That is why the OTQL method is efficient. Ou and Sun [19] pointed out that flipping the bitmap BM for hiding secret data without adjusting the coefficients of quantization could result in distortion. Besides, to improve the quality of the stego image, they introduced an adjusting method for the quantization levels.
Huang et al. [20] introduced a hybrid method increasing as much as l o g 2 T bits by using difference expansion and the reduction of two quantization levels. The merit of this method is that it might not need the type of the blocks. Besides, they also introduced OTQL for higher Embedding Capacity (EC) without loss additionally. Hong [21] introduced a method to embed data in the quantization level of smoothing blocks using Adaptive Pixel Pair Matching (APPM) techniques [22]. Chen and Chi [23] processed by sub-dividing less complex block and highly complex block. In 2016, Malik et al. [24] introduced a DH based on AMBTC using 2-bit plane and 4 quantization levels. The merit of this method is high payload, and the demerit is to decrease the compression rates.
In this paper, we propose a new DH method based on ABTC-EQ with high embedding rates and good image quality. Because in the existing DH based on AMBTC the quality of the cover image is not high compared to the original image, there is a problem that the PSNR of the cover image decreases below 30 dB when we embed many bits into the cover image, and we replace AMBTC with ABTC-EQ in order to solve this problem. Our purpose is to increase the performance of DH by applying the LSB method to the pixels of quantization levels. There exists a demerit to generate some noises in encoding procedure, though the LSB substitution method is enough to achieve our purpose. In order to solve the problem, we propose a way to optimize the errors and enhance the quality of an image by using Optimal Pixel Adjustment Process (OPAP) [6] in this paper.
The rest of this paper is organized as follows. Section 2 briefly reviews AMBTC, ABTC-EQ, LSB substitution and OPAP, and Ou & Sun’s method. The proposed new DH based on ABTC-EQ is introduced in Section 3. Experimental results and discussions are given in Section 4. And Section 5 sketches some conclusions.

2. Related Works

2.1. AMBTC

Lema and Mitchell introduced AMBTC, a variant of BTC which improved BTC’s computation time. Moreover, the quality of the AMBTC is better than that of the BTC. AMBTC obtains the high and low mean of each block and uses these two values to produce a compressed size of grayscale image. In AMBTC, the image is first divided into non-overlapped blocks sized m × m , where m × m may be set to ( 4 × 4 ), ( 8 × 8 ), ( 16 × 16 ), and so on. AMBTC works on block by block, and the mean value for each block is calculated using Equation (1).
x ¯ = 1 m × m i = 1 m 2 x i ,
Here, x i represents the i t h pixel value in this block. For every pixel in each block, binary values (‘0’ or ‘1’) are produced using Equation (2), and a block composed of ‘0’s or ‘1’s is called a bitmap block. That is, a value larger than the value x ¯ is replaced by ‘1’, otherwise replaced by ‘0’.
b i = 1 , if x i x ¯ , 0 , if x i < x ¯ ,
Let t denote the number of ‘1’ in the bitmap BM. The mean Q 2 or Q 1 above or below of x ¯ is calculated in Equation (3).
Q 2 = 1 t x i x ¯ x i and Q 1 = 1 ( m × m ) t x i < x ¯ x i .
The two quantization levels and the bitmap BM can be represented by the basic unit t r i o ( Q 1 0 , Q 2 1 , BM) of compression. The compressed t r i o is used for decoding to reconstruct the grayscale image. For m = 4 , 16 pixels are represented by a t r i o ( Q 1 , Q 2 , B M ) of 8 + 8 + 16 = 32 bits, so the compression ratio (CR) is ( 16 × 8 ) / 32 = 4 . For 512 × 512 pixel images, the file size of 2 M-bits can be reduced to 0.5 M-bits. AMBTC provides better image quality and faster computation, so most BTC-based DH and secret image sharing schemes adopt the AMBTC. Mathews et al. [15] proposed MBTC using a maximum and minimum quantizer to further improve the quality of reconstructed images. AMBTC divides the pixels in a block into two groups (‘0’s or ‘1’s) using the mean of the block, and based on this, obtains two quantization levels. In Equation (4), the threshold value x t h of MBTC is obtained by the mean of the maximum ( x m a x ), the minimum ( x m i n ) and the mean ( x ¯ ) in a block.
x t h = ( x m a x + x m i n + x ¯ ) 3 .
In MBTC, a t r i o is obtained by using x t h instead of the mean of per block. It is a difference between AMBTC and MBTC.

2.2. ABTC-EQ

AMBTC and MBTC in BTC-like obtain two quantization levels in per block using mean values according to the given equations. ABTC-EQ, on the other hand, uses a canny edge detector [25] to find edge from the input image and to obtain quantization levels based on it. To extract two quantization levels, an edge information, E = [ e i ] , for each block ( m × m size) is extracted, which is classified into edge block or non-edge blocks. If E in the block is all zeros, it is a non-edge block, otherwise it is defined as an edge block. We use two quantization level approaches to non-edged block. For non-edge blocks, each block can be represented as a t r i o ( Q 1 , Q 2 , B M n ) using the MBTC method, where B M n notation is used intentionally to represent the bitmap for non-edge blocks. For edge blocks, three cluster ( c 0 , c 1 , c 2 ) are found and grouped using the k-means cluster algorithm [26]. The bit map B M e = [ b i ] of the edge block is generated by Equation (5).
b i = 00 , if x i c 0 , 01 , if x i c i , 10 , if x i c 2 .
The mean Q i ( 1 i 3 ) of each cluster c i is calculated by Equation (6), where Q 1 Q 2 Q 3 . Thus, the edge image block is represented by ( Q 1 , Q 2 , Q 3 , B M e ) .
μ i = 1 | c i | x i c i x i , 0 i 2 .
Bi-clustering and tri-clustering methods are applied to non-edge blocks and edge-blocks. In t r i o , the identifier f is used to distinguish non-edge blocks and edge-blocks, and is defined as ‘1’ and ‘0’, respectively. Finally, k 2 pixels can be represented as ( f = 1 , Q 1 , Q 2 , B M n ) or ( f = 0 , Q 1 , Q 2 , Q 3 , B M n ) . Therefore, the CR in ABTC-EQ is dynamic, not static, as in the previous BTC scheme.

2.3. LSB Substitution and OPAP

Least-Significant-Bit (LSB) substitution is a way to manipulate the LSB planes by directly replacing the LSBs of the cover-image with the hidden bits. Wang et al. [27] introduced a DH by optimal LSB substitution and genetic algorithm, where the worst mean-square-error (WMSE) is shown to be 1/2 of that obtained by the simple LSB substitution technique. Let us look at the DH procedure for the original 8-bit grayscale represented by x i { 0 , 1 , , 255 } . S denotes n-bit hidden values represented as S = { s k | 0 k < n , s k { 0 , 1 } } . The mapping between the n-bit secret bits S = { s k } and the embedded bits S = s k can be defined as follows: s k = j = 0 δ 1 s k × δ + j × 2 δ 1 j . The pixel value x i for embedding the δ -bit s k is changed to form the stego-pixel x i like x i = x i ( x i mod 2 δ ) + s k . The δ LSBs of the pixels are extracted by s k = x i mod 2 δ .
An Optimal Pixel Adjustment Process (OPAP) has an ability to enhance the image quality of the stego-image generated by the simple LSB substitution method and it was proved by mathematically proof. Let x i be the pixel of the cover image, x i be the obtained pixel from pixel x i using the LSB replacement method, and x i is the optimized pixel derived from x i by the OPAP method. Let e = x i x i be the error between x i and x i . x i is obtained by the direct substitution of the δ LSBs of x i with δ secret bits. The value of Δ i may be segmented into three intervals. The OPAP modifies x to form the stego-pixel x as the following rule:
  • Rule 1 ( 2 δ 1 < Δ i < 2 δ ) : if x i 2 δ , then x i = x i 2 δ ; otherwise x i = x i ;
  • Rule 2 ( 2 δ 1 Δ i 2 δ 1 ) : x i = x i ;
  • Rule 3 ( 2 δ < Δ i < 2 δ 1 ) : if x i < 256 2 δ , then x i = x i + 2 δ ; otherwise x i = x i ;

2.4. Ou and Sun’s Method

In this method, smooth blocks of AMBTC are mainly used with DBS method in order to improve DH performance and less image distortion. In addition, the two quantization levels of the block are re-calculated in order to recover the distorted pixels after embedding secret message. For complex blocks, they embed 1-bit into t r i o s by using the OTQL. The detailed procedure of embedding secret bits is described as follows:
Input: A bit sequence S, t r i o s , and a parameter T.
Output: A stego AMBTC-compressed codes t r i o s .
Step 1: 
One block (including two quantization levels and a bit-plane B i ) from the t r i o s is got.
Step 2: 
Compute the absolute difference value d i of two quantization levels Q 1 i and Q 2 i , such that d i = | Q 1 i Q 2 i | .
Step 3: 
If d i > T , 1-bit from S can be embedded. If s i is equal to ‘1’, the bit plane B M i is toggled and the two quantization levels are exchanged, t r i o ( Q 2 i , Q 1 i , B M ¯ i ) . Then, add ( Q 2 i , Q 1 i , B M ¯ i ) into t r i o s . If s i is equal to ‘0’, there is no change of the t r i o . Return to Step 1 to process the next block.
Step 4: 
If d i T , the 16-bits from S can be embedded. The bit-plane B M i are substituted with the 16-bits. Re-calculate two new quantization levels Q 1 i and Q 2 i . Then, add ( Q 1 i , Q 2 i , B M i ) into t r i o s . Return to Step 1 to process the next block.
Step 5: 
Repeat Steps 1∼4 until all the blocks are completely processed. The output compressed t r i o s , each of which contains two quantization levels and 1-bit plane.

3. The Proposed Scheme

This section discusses new DH method based on ABTC-EQ by using OPAP. In our proposed method, OPAP combine existing DBS and OTQL to increase the performance. Also, to improve the quality of the image, ABTC-EQ is used as the cover image. Thus, the method can embed an appropriate amount of secret data while maintaining the displayed image quality. A complete description of the proposed algorithm along with an example is given in Section 3.3.

3.1. Embedding Procedure

First, t r i o s are generated by compressing the original gray image with ABTC-EQ before applying the proposed embedding algorithm. The generated t r i o s consist of quantization levels and bitmaps. The quantization levels representing each block are Q 1 , Q 2 , and Q 3 . If the image is an edged block, Q 3 is required. A bitmap B M = { x i | 0 i < n , x i { { 0 , 1 } { 0 , 1 , 2 } } } is divided into two groups: { 0 , 1 } and { 0 , 1 , 2 } . If the image is an edged block, three elements of { 0 , 1 , 2 } are needed. The procedure of DH in our proposed method is shown in Figure 1. Three methods (OPAP, DBS, and OTQL) are applied to the generated t r i o s in order to conceal the data. The proposed method is applied to the t r i o s block repeatedly.
To improve DH performance, the OPAP algorithm is used for DH regardless of block type (i.e., smooth or complex). By increasing or decreasing the pixel value by one according to the pattern of the LSB, it is possible to reduce the distortion of the image while increasing the number of data concealment bits. When we use the previous DBS method to the bitmaps, only the { 0 , 1 } bitmap is used, and { 2 } is not used for DH to reduce image distortion. The DBS method distinguishes two group, that is, smooth and complex blocks, using a threshold and the DBS method may be used only for smooth blocks. In addition, to complex blocks, we use OTQL method to hide 1-bit per block additionally. Our proposed method should apply OPAP, DBS, and OTQL in order, and keep this order in the data extraction process. The complete proposed embedding algorithm is discussed as follows:
Input: original image I of size M × N pixels, T: threshold, S: secret bits
Output: ABTC-EQ compressed marked codes, t r i o s
Step 1: 
Divide the original image into non-overlapping 4 × 4 sized blocks. Next, apply the ABTC-EQ method to compress every block. After all, we obtain two or three quantization values and one bitmap for each block, which is represented as t r i o ( Q 1 , Q 2 , [ Q 3 ] , B M ) .
Step 2: 
Fetch one t r i o from compressed packet ( t r i o s ) according to the defined order. Embed 4-bits into two quantization level values, Q 1 and Q 2 , using OPAP rules (Table 1 and Table 2), which is LSB optimization we proposed. Transform the value Q 1 into binary value and then embed one bit into second LSB by using the rule (Table 1 and Equation (7)) (notes, the variables S and O P are secret bit and operation, respectively. For example, given the 2LSB and LSB are ‘00’ and S is ‘1’, it may embed S =‘1’ into the pixel using the calculation of the OP, ‘ Q 1 1 ’). Then, it is possible to hide 1-bit as XOR operation between 2LSB and LSB of the pixel Q 1 and the given operation, according to the rule of Table 2 and Equation (8). For the pixel Q 2 , the same procedure as shown in the pixel Q 1 is used and it may embed 2-bits additionally.
Q 1 = Q 1 1 , if ( 2 L S B ( 0 ) and L S B ( 0 ) ) and S ( 1 ) , Q 1 + 1 , if ( 2 L S B ( 0 ) and L S B ( 1 ) ) and S ( 1 ) , Q 1 1 , if ( 2 L S B ( 1 ) and L S B ( 0 ) ) and S ( 0 ) , Q 1 + 1 , if ( 2 L S B ( 1 ) and L S B ( 1 ) ) and S ( 0 ) , n o c h a n g e , o t h e r w i s e
Q 2 = Q 2 1 , if ( 2 L S B ( 1 ) and L S B ( 1 ) ) and S ( 1 ) , Q 2 + 1 , if ( 2 L S B ( 1 ) and L S B ( 0 ) ) and S ( 0 ) , Q 2 1 , if ( 2 L S B ( 0 ) and L S B ( 1 ) ) and S ( 0 ) , Q 2 + 1 , if ( 2 L S B ( 0 ) and L S B ( 0 ) ) and S ( 1 ) , n o c h a n g e , o t h e r w i s e
Step 3: 
If ( | Q 1 i Q 2 i | ) T , take bitmap BM from the t r i o and apply Equation (9) to it (notes: count 0 s and 1 s in the BM, then take the same number of secret bits from the S). Replace every binary element of the BM with secret bits S in the specified order directly; otherwise, go to Step 2.
B M i = S i c o u n t ( B M i = 0 or 1 ) , if ( | Q 1 i Q 2 i | T ) , n o a c t i o n , o t h e r w i s e .
Step 4: 
If ( | Q 1 i Q 2 i | ) 0 and S i = 1 , change order of two quantization level Q 1 and Q 2 , that is, t r i o ( Q 2 , Q 1 , B M ) . If ( | Q 1 i Q 2 i | ) 0 and S i = 0 , it is remained unchanged.
Step 5: 
Steps 2 ∼ 4 are repeated until all t r i o s are scanned.
Step 6: 
Save the t r i o s and return to the m a i n function.

3.2. Extraction Procedure

The procedure to extract data from marked t r i o s is shown in Figure 2. First, read a block ( t r i o ) from t r i o s . Then, OPAP, DBS, and OTQL are applied to the quantization level and the bitmap in order to extract the secret bits hidden in the t r i o s . At this time, t r i o s are divided into smooth blocks and complex blocks by using a predefined threshold T. OPAP are applied to t r i o s regardless of the type (i.e., smooth or complex) of them. DBS is used on only smooth blocks. Lastly, the order of two quantization levels are used to hide 1-bit per block additionally.
The complete proposed extraction algorithm is discussed as follows:
Input: AMBTC compressed marked codes, T is threshold
Output: S is secret data bit stream
Step 1: 
The i t h block is fetched from compressed packet, t r i o s , according to the defined order.
Step 2: 
For the quantization values Q 1 and Q 2 of the i t h t r i o , Equations (10) and (11) are used for obtaining 4-bits of hidden bits. (note: the l is an indexing variable).
[ s l + 1 ] = Q i 2 mod 2 ,
[ s l + 2 ] = x o r Q i 2 mod 2 , Q mod 2
Step 3: 
If ( | Q 1 i Q 2 i | ) T , Equation (12) is applied to the BM for obtaining the hidden bits. That is, the hidden bits are appended in s l . Otherwise, go to Step 1.
s l = B M i , if ( | Q 1 i Q 2 i | T and B M i = 0 or 1 ) , go to [ Step 1 ] , o t h e r w i s e .
Step 4: 
If ( | Q 1 i Q 2 i | ) 0 and the order of two quantization level is ascending order, then assign ‘0’ into s l . if ( | Q 1 i Q 2 i | ) 0 and the order is descending order, then assign ‘1’ into s l .
Step 5: 
Steps 1∼4 are repeated until all t r i o s are scanned.
Step 6: 
Return to m a i n function.

3.3. Example of Embedding Process

In Figure 3a–d, the example of the proposed embedding algorithm is discussed. A secret bit stream S = ( 110011001001011010101 ) 2 and threshold T = 6 are considered to the example. Suppose there is a block B = ( 101 100 96 94 101 100 96 94 101 100 96 94 101 100 96 94 ) of the original image. Canny edge detector confirmed B as non-edged block. Thus, we apply the procedure of Figure 3a to B. That is, first, x t h ( = ( ( 101 + 94 + 97 ) ) / 3 ) is calculated using Equation (4). If x i is greater than or equal to x t h , ‘1’ is assigned to the position of the corresponding pixel. Otherwise, ‘0’ is assigned to the position.
Finally, the bitmap is constructed by this procedure. Two quantization levels representing the original block are obtained by using Equation (3). That is, Q 1 = 95 and Q 2 = 100 . The compression type of a block represents as t r i o ( f , Q 1 , Q 2 , B M ) = ( 1 , 95 , 100 , 1100110011001100 ) . Figure 3b shows the detailed procedure that secret bits S = ‘ 1100 ( 2 ) ’ is embedded into the two quantization levels Q 1 and Q 2 by OPAP method. Then, first, convert Q 2 and Q 1 to binary, ( Q 2 : 01100100 , Q 1 : 01011111 ) .
We may exploit Rule 1 (Table 1, Equation (7)) to embed the bit S 1 = ‘1’ into the 2LSB of Q 1 . In case of Q 1 , there is no need to apply Rule 1 of Equation (7) since 2LSB = ‘1’. To embed consecutive 1-bit, we apply Equation (8) into the quantization level Q 1 . That is, we obtain Q 1 ( 94 ) by the equation of Q 1 1 , since (XOR (2LSB = 1, LSB = 1) = 0) and s l = ‘1’. For Q 2 , we also may obtain Q 2 ( 100 ) by the same procedure as Q 1 . The procedure of Q 2 concealing ‘00’ is unnecessary, because Q 2 already had ‘00’.
Lastly, we finished embedding 4-bits in two quantization levels, Q 1 and Q 2 , by using OPAP. We can see the procedure where the bitmap is replaced by the secret bits of 4 × 4 sized block directly by DBS method in Figure 3c. For embedding secret bits S, the bit stream of S replace the BM of the smooth block directly. Thus, we have to find the smooth blocks according to predefined threshold value T of criteria ( | Q 1 Q 2 | T = | 94 100 | 6 | ) and then apply DBS method to the blocks. In this example, this block is the smooth block because it satisfies with the given criteria.
That is, the block BM is filled with S = ( 1100100101101010 ) (Figure 3c). Figure 3d may use existing OTQL method to embed 1-bit additionally. This OTQL method is recommended by having an hint from the fact that two or three quantization levels of the blocks are specific ordered when each block is compressed. In other words, if the hidden bit is S =‘1’, then we change the order of two quantization levels. In Figure 3d, switch the order of Q 1 and Q 2 , that is, t r i o ( Q 2 , Q 1 , B M ) = ( 1 , 100 , 94 , 1100100101101010 ) .

3.4. Example of Extraction Process

In this section, we introduce extraction procedure of hidden bits from the given t r i o ( Q 2 , Q 1 , B M ) = ( 100 , 94 , 1100100101101010 ) . First, the hidden bit ‘ 11 ( 2 ) ’ may be extracted from the Q 1 = 94 using Equations (10) and (11), that is, 2 L S B ( Q 1 ) and 2 L S B ( Q 1 ) L S B ( Q 1 ) , respectively. After, we might obtain the hidden values ‘ 00 ( 2 ) ’ from Q 2 = 100 applying Equations (10) and (11) to Q 2 , respectively. Before applying DBS method, we confirm whether or not the block is edged block using canny edge detector and k-mean. Thus, it is possible to achieve as assigning all pixels of the BM into the variable S when ( | Q 1 Q 2 | T and BM = 0 or 1 ) . Finally, we get the hidden bits S with this decoding procedure, that is, S = ( 110011001001011010101 ) 2

4. Experimental Results and Discussions

In this section, we compare and analyze the experimental results of the proposed and other existing methods. For a comparison and analysis, we use nine grayscale images of size 512 × 512 pixels, as shown in Figure 4. The secret data used in the experiments are random bits generated by the Pseudo Random Number Generator (PRNG). For evaluation, EC and peak signal-to-noise ratio (PSNR) are used to compare the performance of the existing and proposed methods. The DH capacity represents the number of secret bits contained in the cover image. The quality of the image is measured by the PSNR defined as:
PSNR = 10 l o g 10 255 2 M S E .
In other words, PSNR is the ratio between the maximum possible power of a signal and the power of noise that affects the fidelity of its representation. The MSE used for the PSNR is the average intensity difference between the compressed and the reference image. If the MSE value of the compressed image is low, the image quality is evaluated as good. MSE is calculated used the reference image p and the distorted image p as follows.
MSE ( p , p ) = 1 N i = 1 N ( p i p i ) 2 .
The error value ε = p i p i , denotes the difference between the original and the distorted signal. The 255 2 means the allowable pixel intensity in Equation (13).
Structural Similarity Index Metric (SSIM) [22] is used to evaluate the resemblance between the cover image and the stego-image. SSIM is designed to deal with the quality of the whole image by constructing and combining equations with luminance, contrast, and structure that are recognized as the main contents in human vision. The average luminance, contrast and structural information are combined together to produce the quality index. The yield of SSIM value is limited in the range between 0 and 1. If the SSIM value is near to 1 the stego-image is alike the cover image and it has high quality. Equation (15) is used to calculate the value of SSIM:
S S I M ( x , y ) = ( 2 μ x μ y + c 1 ) ( 2 σ x y + c 2 ) ( μ x 2 μ y 2 + c 1 ) ( σ x 2 + σ y 2 + c 2 ) ,
where μ x and μ y are mean values of cover image x and stego-image y and σ x and σ y are standard deviation values of the cover image and stego image while, σ x y means the covariance of both two images. c 1 and c 2 are constants to stabilize the division.
Like we discuss about the proposed algorithm, the blocks of the ABTC-EQ are categorized by using threshold T into smooth and complex block. Moreover, a threshold value may affect an image quality as well as an EC of DH. Table 3 shows the comparison of the performance of compression, PSNR, and SSIM in compression methods such as AMBTC, MBTC, and ABTC-Equation We know that ABTC-EQ represents better performance in all aspect of PSNR, CR, and SSIM.
If the threshold value increases, the image quality becomes down, while the EC of DH is increased. In other words, there exists inverse correlation between image quality and embedding capacity. In Table 4, we use the performance like EC and PSNR to compare between our proposed method and existing methods (i.e., Ou & Sun, Huang et al., and W. Hong). For a fair performance comparison, we evaluate the performance using two threshold values (i.e., 10 and 20) in every block of two compression methods, that is, AMBTC and ABTC-Equation In Table 4, we notice the performance of PSNR and EC according to the various threshold values T. There is a trade-off between EC and image quality, while it may be different in various methods.
Our proposed scheme is the first DH based on ABTC-EQ, while the existing three methods (i.e., Ou & Sun, Huang et al., and W. Hong) are based on AMBTC. Our proposed method is superior to those of existing methods in aspect of image quality. For Peppers and Tiffany images when T = 10 , the PSNRs of Huang et al. are higher than our proposed method by 0.2 dB. Except these two cases, the proposed method showed excellent results in two criteria namely PSNR and EC.
Huang et al.’s method offers high EC with keeping low distortion when T = 10 and 20, relatively. And, this method may be better than the previous schemes (i.e., Ou & Sun and W. Hong) because it has a code to improve image quality. But the proposed method based on ABTC-EQ can offer higher EC and PSNR than those based on AMBTC generally. The weakness of our method is that it provides somewhat higher performance for smooth images, but at some specific points PSNR falls but does not get much worse.
In Figure 5, we show the performance comparisons between the proposed method based on ABTC-EQ and the existing methods based on AMBTC, respectively. In the case of (a) Lena, (c) Zelda, and (d) Airplane in Figure 5, our proposed scheme offers good performance in aspects of EC and PSNR. When T = 20 , in L e n a image, ECs and PSNRs of our proposed method and Huang et al.’s method are 290,668 (31.8599 dB) and 285,651 (30.344 dB), respectively. Therefore, it show that our proposed method is good objectively.
For all images, the PSNRs of our proposed scheme shows excellent performance compared to existing schemes for when secret bits are less than equal 100,000. According to increase secret bits, the gap of PSNR is gradually reduced between our proposed method and Huang et al.’s method.
In Figure 5b, the PSNR values of our proposed method are almost similar to those of Huang et al.’s method. After then, it is shown that the PSNR of our proposed method is reduced rather than that of Huang et al.’s method, but the gap between them is not high. In our proposed scheme, it has an ability to embed 320,000 bits maximally into cover image although it was difference by the feature of the image, while Huang et al.’s method has a capability to embed more than 340,000 bits.
But, if more than 310,000 bits (information) will be embedded into most cover images, they become useless as cover media, since the PSNR of them become low, less than 30 dB. Huang et al.’s method is also in that same performance range. Our proposed scheme is possible to embed more than 340,000 bits if we make sacrifice PSNRs even larger using LSB3 and LSB4. In order to keep allowable PSNR, it is proved that our proposed optimization for LSB pixels is an efficient solution.
Figure 6 is shown an evaluation that we embed same number of bits (i.e., 280,000) into Lena cover image using four DH methods including our proposed method and existing methods, then compare marked Lena images using the human visual system and PSNRs. Both of (a) and (c) in Figure 6 exhibit low image quality of less than 30 dB as a result of experiment, while (b) and (d) show high image quality as 30.5441 dB and 32.5431 dB, respectively. Especially, we find out that our proposed method has highest image quality among them. Therefore, we proved that our proposed scheme is appropriate for covert communication through the simulation.

5. Conclusions

In this paper, we proposed a DH method based on ABTC-EQ like BTC and used OPAP method to optimize pixels. ABTC-EQ offers high PSNR compared to AMBTC, so ABTC-EQ may be very useful cover media. In addition, the OPAP is used to reduce the loss of PSNR from the noises generated in DH process. In order to improve the efficiency for DH, each block in ABTC-EQ is categorized into the smooth and complex block and our proposed method may be applied to both types of the blocks. That is, if the block is smooth block, DBS method is applied to it and we may exchange the order of two quantization levels to hide additional one bit. The OPAP is applied to two quantization levels regardless of the categorization of the blocks. Thus, that is the explanation of the reason why our proposed scheme has high embedding capacity compared to Huang et al.’s scheme. The experimental results show that our proposed scheme offers high EC without loss of quality of a cover image.

Author Contributions

Conceptualization, C.-N.Y. and C.K.; methodology, C.K.; validation, C.-N.Y. and C.K.; formal analysis, C.-N.Y.; writing—original draft preparation, C.K. and L.L.; funding acquisition, C.-N.Y., C.K., and L.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Natural Science Foundation of China (61866028), Key Program Project of Research and Development (Jiangxi Provincial Department of Science and Technology)(20171ACE50024), Foundation of China Scholarship Council (CSC201908360075), Open Foundation of Key Laboratory of Jiangxi Province for Image Processing and Pattern Recognition (ET201680245, TX201604002). This research was supported in part by the Ministry of Science and Technology (MOST), under Grant MOST 108-2221-E-259-009-MY2. This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by (2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dragoi, I.C.; Coltuc, D. Local-pediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 2014, 23, 1779–1790. [Google Scholar] [CrossRef] [PubMed]
  2. Bender, W.; Gruhl, D. Techniques for data hiding. IBM Syst. J. 1996, 35, 313–336. [Google Scholar] [CrossRef]
  3. Huang, F.; Qu, X.; Kim, H.J.; Huang, J. Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 2016, 26, 1610–1621. [Google Scholar] [CrossRef]
  4. Kim, C.; Shin, D.; Yang, C.N.; Chen, Y.C.; Wu, S.Y. Data hiding using sequential hamming +k with m overlapped pixels. KSII Trans. Internet Inf. 2019, 13, 6159–6174. [Google Scholar]
  5. Mielikainen, J. LSB matching revisited. IEEE Signal Proc. Lett. 2006, 13, 285–287. [Google Scholar] [CrossRef]
  6. Chan, C.K.; Cheng, L.M. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
  7. Leng, L.; Li, M.; Kim, C.; Bi, X. Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed. Tools Appl. 2017, 76, 333–354. [Google Scholar] [CrossRef]
  8. Leng, L.; Zhang, J.S.; Khan, M.K.; Chen, X.; Alghathbar, K. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int. J. Phys. Sci. 2010, 5, 2543–2554. [Google Scholar]
  9. Shi, Y.Q.; Li, X.; Zhang, X.; Wu, H.T.; Ma, B. Reversible data hiding: Advances in the past two decades. IEEE Access 2016, 4, 3210–3237. [Google Scholar] [CrossRef]
  10. Rahmani, P.; Dastghaibyfard, G. Two reversible data hiding schemes for VQ-compressed images based on index coding. IET Image Process. 2018, 12, 1195–1203. [Google Scholar] [CrossRef]
  11. Delp, E.; Mitchell, O. Image compression using block truncation coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
  12. Lema, M.D.; Mitchell, O.R. Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 1984, COM-32, 1148–1157. [Google Scholar] [CrossRef]
  13. Kumar, R.; Singh, S.; Jung, K.H. Human visual system based enhanced AMBTC for color image compression using interpolation. In Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 7–8 March 2019; pp. 903–907. [Google Scholar]
  14. Hong, W.; Chen, T.S.; Shiu, C.W. Lossless steganography for AMBTC compressed images. In Proceedings of the 2008 Congress on Image and Signal Processing, Sanya, China, 27–30 May 2008; pp. 13–17. [Google Scholar]
  15. Mathews, J.; Nair, M.S.; Jo, L. Modified BTC algorithm for gray scale images using max-min quantizer. In Proceedings of the International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing—iMac4s 2013 (India), Kottayam, India, 22–23 March 2013; pp. 377–382. [Google Scholar]
  16. Mathews, J.; Nair, M.S. Adaptive block truncation coding technique using edge-based quantization approach. Comput. Electr. Eng. 2015, 43, 169–179. [Google Scholar] [CrossRef]
  17. Chuang, J.C.; Chang, C.C. Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. Appl. 2006, 28, 329–333. [Google Scholar]
  18. Chen, J.; Hong, W.; Chen, T.S.; Shiu, C.W. Steganography for BTC compressed images using no distortion techniqu. Imaging Sci. J. 2010, 58, 177–185. [Google Scholar] [CrossRef]
  19. Ou, D.; Sun, W. High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 2015, 74, 9117–9139. [Google Scholar] [CrossRef]
  20. Huang, Y.H.; Chang, C.C.; Chen, Y.H. Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed. Tools Appl. 2017, 76, 6159–6174. [Google Scholar] [CrossRef]
  21. Hong, W. Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry 2018, 10, 36. [Google Scholar] [CrossRef] [Green Version]
  22. Hong, W.; Chen, T.S. A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 2012, 7, 176–184. [Google Scholar] [CrossRef]
  23. Chen, Y.Y.; Chi, K.Y. Cloud image watermarking: High quality data hiding, and blind decoding scheme based on block truncation coding. Multimed. Syst. 2019, 25, 551–563. [Google Scholar] [CrossRef]
  24. Malik, A.; Sikka, G.; Verma, H.K. An AMBTC compression-based data hiding scheme using pixel value adjusting strategy. Multidimens. Syst. Signal Process. 2018, 29, 1801–1818. [Google Scholar] [CrossRef]
  25. Canny, J. A computational approach to edge detection. IEEE Trans. Pattern Anal. 1986, PAMI-8, 679–698. [Google Scholar] [CrossRef]
  26. Kanungo, T.; Mount, D.M.; Netanyahu, N.S.; Piatko, C.D.; Silverman, R.; Wu, A.Y. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. 2002, 24, 881–892. [Google Scholar] [CrossRef]
  27. Wang, R.Z.; Lin, C.F.; Lin, J.C. Hiding data in images by optimal moderately significant-bit replacement. IEE Electron. Lett. 2000, 36, 2069–2070. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Schematic of the embedding procedure.
Figure 1. Schematic of the embedding procedure.
Electronics 09 00644 g001
Figure 2. Schematic of the extraction procedure.
Figure 2. Schematic of the extraction procedure.
Electronics 09 00644 g002
Figure 3. Example of data hiding based ABTC -Equation.
Figure 3. Example of data hiding based ABTC -Equation.
Electronics 09 00644 g003
Figure 4. Test images; (ai): 512 × 512 .
Figure 4. Test images; (ai): 512 × 512 .
Electronics 09 00644 g004
Figure 5. Performance comparisons of the proposed method and other related methods (i.e., Ou and Sun [19], Huang et al. [20], and Hong [21]) based on AMBTC and ABTC-EQ compressed image for four typical images: (a) Lena, (b) Tiffany, (c) Zelda, and (d) Airplane.
Figure 5. Performance comparisons of the proposed method and other related methods (i.e., Ou and Sun [19], Huang et al. [20], and Hong [21]) based on AMBTC and ABTC-EQ compressed image for four typical images: (a) Lena, (b) Tiffany, (c) Zelda, and (d) Airplane.
Electronics 09 00644 g005
Figure 6. Visual comparison after embedding the same 280,000 bits into the Lena image by using four different methods such as (a) Ou and Sun [19], (b) Huang et al. [20], (c) W. Hong [21], and our proposed method.
Figure 6. Visual comparison after embedding the same 280,000 bits into the Lena image by using four different methods such as (a) Ou and Sun [19], (b) Huang et al. [20], (c) W. Hong [21], and our proposed method.
Electronics 09 00644 g006
Table 1. Rule of optimal pixel adjustment process (OPAP) for second Least Significant Bit (LSB).
Table 1. Rule of optimal pixel adjustment process (OPAP) for second Least Significant Bit (LSB).
PixelSOPPixel
Second LSBFirst LSBSecond LSBFirst LSB
001 Q 1 11
011 Q + 1 10
100 Q 1 01
110 Q + 1 00
Table 2. Rule of OPAP for first and second LSB.
Table 2. Rule of OPAP for first and second LSB.
Pixel XORSOPPixel
Second LSBFirst LSBSecond LSBFirst LSB
1101 Q 1 10
1010 Q + 1 11
0110 Q 1 00
0001 Q + 1 01
Table 3. Comparison of BTC-like schemes on PSNR, CR, and SSIM.
Table 3. Comparison of BTC-like schemes on PSNR, CR, and SSIM.
Test ImagesMethodBlock Size( 4 × 4 )PixelsBlock Size( 8 × 8 )Pixels
PSNRCRSSIMPSNRCRSSIM
AMBTC33.424.000.990129.996.400.9587
LenaMBTC33.874.000.990130.076.400.9614
ABTC-EQ37.493.090.994434.074.360.9826
AMBTC33.574.000.990829.736.400.9619
PeppersMBTC34.054.000.990430.496.400.9629
ABTC-EQ37.593.090.993934.074.360.9818
Table 4. Comparison of the performance using EC and PSNR of the proposed method and existing methods (where our proposed scheme is based on Adaptive BTC based on Edge Quantization (ABTC-EQ) and the others are based on AMBTC).
Table 4. Comparison of the performance using EC and PSNR of the proposed method and existing methods (where our proposed scheme is based on Adaptive BTC based on Edge Quantization (ABTC-EQ) and the others are based on AMBTC).
ImagesTOu and Sun [19]Huang et al. [20]W. Hong [21]The Proposed
ECdBECdBECdBECdB
Bridge1056,41728.3860102,90528.318176,49828.3341202,28931.9515
Elaine139,42532.0391180,74932.3638163,06731.9954245,63333.6242
Boats160,91331.0204201,03230.9255186,33030.9774223,66833.0478
Goldhill127,40931.6842169,61331.8073150,34931.6372193,96632.7781
Airplane194,89731.3173232,88631.2578221,82431.2796256,58133.8083
Lena193,24932.3724231,34732.4457220,20532.3277254,18234.1004
Peppers200,36932.2246238,02232.5160227,28732.1842261,67731.7616
Tiffany197,76133.6220235,49333.7989225,48833.5795260,22729.9104
Zelda212,75333.6013249,63234.0245240,48333.5452270,24834.5302
Average164,79931.8075204,63131.9397190,17031.7623240,94132.8347
ImagesTOu and Sun [19]Huang et al. [20]W. Hong [21]The Proposed
ECdBECdBECdBECdB
Bridge20125,13727.0885183,66027.1761148,95327.0828269,70131.2579
Elaine249,60128.9561300,37729.4604280,80128.9606272,18633.1541
Boats205,80929.5664259,50629.3043233,70929.5557266,65030.3882
Goldhill212,19329.1224265,47929.4090240,23129.1121268,75929.6549
Airplane226,97730.1906279,34329.6937256,11030.1792282,28931.828
Lena233,69730.7508285,65130.3440263,36630.7356290,66831.8599
Peppers240,97730.6910292,47630.4371271,13230.6750296,88329.8852
Tiffany241,92131.4269293,24931.0589272,69131.4116295,39428.5693
Zelda253,84131.5579304,53631.2650284,86631.5299303,26832.6241
Average221,12829.9278273,80929.7943250,20729.9158282,86631.0246

Share and Cite

MDPI and ACS Style

Kim, C.; Yang, C.-N.; Leng, L. High-Capacity Data Hiding for ABTC-EQ Based Compressed Image. Electronics 2020, 9, 644. https://doi.org/10.3390/electronics9040644

AMA Style

Kim C, Yang C-N, Leng L. High-Capacity Data Hiding for ABTC-EQ Based Compressed Image. Electronics. 2020; 9(4):644. https://doi.org/10.3390/electronics9040644

Chicago/Turabian Style

Kim, Cheonshik, Ching-Nung Yang, and Lu Leng. 2020. "High-Capacity Data Hiding for ABTC-EQ Based Compressed Image" Electronics 9, no. 4: 644. https://doi.org/10.3390/electronics9040644

APA Style

Kim, C., Yang, C. -N., & Leng, L. (2020). High-Capacity Data Hiding for ABTC-EQ Based Compressed Image. Electronics, 9(4), 644. https://doi.org/10.3390/electronics9040644

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop