1. Introduction
A massive storm of large-scale data has come from the accelerated development of digital multimedia. Various applications produce images, audio, and videos daily. The security of critical data and the gigantic volume of data are the two major issues this trend has brought forth. To enhance the confidentiality of data transmission, the sender encrypt the data using conventional cryptographic techniques or imperceptibly transfer data using data-hiding techniques [
1,
2,
3]. At the same time, the best way to minimize data size and lower transmission costs is to use a data compression technique [
4]. Inevitably, data-hiding research in the compression domain presents a immense challenge to academics because it is essential to balance the hiding capacity with compressed image quality.
Data hiding defines as imperceptibly method of hiding confidential data inside other media i.e. digital image, video and audio. An image data hiding scheme categorized into three domains [
5] namely spatial domain, frequency domain, and compressed domain. In order to embed confidential data, the spatial domain method is directly modifying the image pixel. It caused the low imperceptibility. On the other side, the frequency domain method hides the confidential data into transformed coefficients. Lastly, the compressed domain method manages the confidential messages in the compressed codes of digital images. Both frequency and compressed domain perform better imperceptibility than spatial domain.
In general, two metrics are used to assess the performance of a data-hiding hiding technique. The first is hiding capacity. Hiding capacity identifies as the quantity of confidential data concealed in a cover media. The second metric is imperceptibility. Imperceptibility defines as the imperceptibility defines as the level of image quality after modification. The primary issue in the data hiding research is that the higher the hiding capacity, the lower the imperceptibility.
Along with the big data age, where the volume and variety of data are abundant, compression technology is experiencing advancements. Data compression technology is efficient in data transmission. This is due to the fact that computing is simple and inexpensive. There are several widely used compression methods, including vector quantization (VQ) [
6,
7,
8], block truncation coding (BTC) [
9,
10,
11,
12], AMBTC [
13], and JPEG compression [
14,
15,
16]. Beginning by Delp and Mitchell [
9] in 1979 which proposed block truncation coding (BTC) for image compression. Then further developed in 1984 by Lema and Mitchell [
13] known as absolute moment block truncation coding (AMBTC). AMBTC offers simpler computation than BTC, and performs better image quality.
Due to the benefits of the compression technique, data hiding research is evolving into compression domain data hiding. AMBTC compressed image data hiding method was done by researchers [
17,
18,
19,
20,
21,
22,
23,
24]. In 2020, Lee et al. [
17] presented a reversible data hiding based on Turtle-shell for AMBTC compressed images. Their method provided lower computation complexity and achieved accepted image quality. However, the method does not achieve high hiding capacity because it cannot embed the confidential messages in the complex image.
This research proposes an innovative data hiding scheme for AMBTC compressed images based on the combination theory. Experimental findings show that our proposed scheme achieves high hiding capacity and high image quality, even in complex images.
The remainder of this work is structured as follows.
Section 2 provides an overview of the related study. Our proposed data-hiding method is described in
Section 3.
Section 4 contains the findings of the experiments.
Section 5 finally presents the conclusions.
2. Related works
2.1. Absolute Moment Block Truncation Coding (AMBTC)
In 1984, AMBTC was introduced by Lema and Mitchell [
13]. The main steps of AMBTC consist of encoding and decoding procedures, and detailed explained as follows:
The Encoding Procedure
Step 1. Segments the images into a collection of t × t non-overlapping blocks.
Step 2. Calculates the mean
μ and standard deviation
α by using (1) and (2), respectively. Assume that
s the value of pixel in the block’s position
(i, j).
Step 3. Creates the bitmap value
by using (3):
The Decoding Procedure
Step 1. Calculates two quantizers, i.e., high quantizer
hq and low quantizer
lq using (4) and (5), respectively.
Where q is the quantity of which greater than or equal to the mean value μ.
Step 2. Create the reconstructed block
by using (6):
In order to provide a detailed understanding of the AMBTC compression method, we provide a numerical example as follows.
Figure 1 depicts the illustration of AMBTC. First,
Figure 1a depicts the original image block size of 4 × 4. Next, we computed the block means μ and standard deviation α, by using (1) and (2) respectively. In this example, the value of μ=78 and α=19. Next, we generate the bitmap in the encoding procedure using (3). The result is shown in
Figure 1b. Finally, we calculate the higher and lower quantization levels,
hq and
lq, using (4) and (5), respectively. In this example,
hq=105 and
lq=62. Finally, the reconstructed image block generated in the decoding procedure using (6) is shown in
Figure 1c.
2.2. The Combination Theory
Wu et al. [
25] introduced a novel data-hiding method for binary images using combination theory in 2017. In their method, senders can hides more than one bit of confidential data by modifying one pixel at maximum in one block. The experimental result presented by Wu
et al.’ scheme [
25] increases the embedding capacity and reduces the distortion of the modified image.
The main procedure of Wu
et al.’ scheme [
25] is as follows:
Step 1. Calculate block maximum payload by (7):
Step 2. Develop a hidden location matrix P as described in [
25].
Step 3. Produce the new computed hidden location matrix P' by P⊗Gi.
Then, using Algorithm 1, calculate the total number T(Sr, r =1, 2,..., b) of each bit of confidential data that exists in P'.
Algorithm 1 Confidential Data Calculation
|
FOR p = 1 : u ; q = 1 : v |
IF P’x,y hasSr
|
T(Sr) = T(Sr) +1 |
END |
END |
Step 4. Calculate the residual value S'r for the total amount of instances of each bit Sr by modulo as in (8)
Step 5. Investigate the original confidential data Sr to the feature value S’
r by (9) which consists of S
r such that Sr ≠S’
r
Step 6. Conceal the confidential data into a block Gi by changing only one pixel of Gi according to Algorithm 2.
Algorithm 2 Confidential Data Embedding
|
FOR p = 1 : u ; q = 1 : v
|
IF Px,y= S’’ |
IF Gi (p,q) = 1 |
Gi (p,q) = 0 |
ELSE |
Gi (p,q) = 1 |
END |
END |
END |
3. The Proposed Method
Inspired by Wu et al.’s scheme [
25], in this paper, we propose an innovative data-hiding scheme for AMBTC image compression based on the combination theory.
Figure 2 shows the flowchart of the proposed data hiding scheme, consisting of image compression and data embedding. The proposed scheme involves embedding and extracting procedures.
Section 3.1 provide the embedding procedures. While,
Section 3.2 present the extracting procedures.
3.1. The Embedding Procedures
In this part, we present the procedures of concealing confidential data into the compressed image using a hidden position matrix which generated by the combination theory. Our proposed embedding procedure is explained in depth as follows.
Input: an original image TI, with R width and S height, confidential data S.
Output: Compressed stego image TI’.
Given an original image TI, with R width and S height, segment into the n×n non-overlapping block image.
Step 1. Compress the original image block to obtain the bitmap value,
Bm, according to
Section 2.1.
Step 2. Embed the confidential data
S into the bitmap
Bm according to
Section 2.2.
An example is given further to describe the proposed scheme for better understanding.
Input: Suppose we have a block size of 4×4 pixels of an image. The block consisting the original pixel values {44, 61, 72, 58, 74, 65, 79, 62, 127, 93, 75, 56, 112, 117, 103, 60}. The confidential data stream S that must be concealed is (1101)2.
Step 1. Compress the original image block by using the AMBTC method.
Figure 3 is the AMBTC encoding of the given pixel value.
Step 2. Embed the confidential data bits into a bitmap by implementing the combination theory as explained in
Section 2.1.
Figure 4.
Secret position matrix generation: (a) Bitmap; (b) Secret position matrix P; (c) New secret position matrix P’.
Figure 4.
Secret position matrix generation: (a) Bitmap; (b) Secret position matrix P; (c) New secret position matrix P’.
Figure 5.
Secret matrix calculation: (a) SUM of (A); (b) SUM of (B); (c) SUM of (C); (d) SUM of D.
Figure 5.
Secret matrix calculation: (a) SUM of (A); (b) SUM of (B); (c) SUM of (C); (d) SUM of D.
Figure 6.
Final result: (a) Original bitmap; (b) Stego bitmap; (c) Reconstructed original image; (d) Reconstructed stego image.
Figure 6.
Final result: (a) Original bitmap; (b) Stego bitmap; (c) Reconstructed original image; (d) Reconstructed stego image.
3.2. The Extraction Procedures
The extracting procedures are performed to retrieve confidential data. Our proposed extracting procedure is explained in depth below.
Step 1. Calculate the new matrix where for all p=1, 2,…, u, and q=1, 2,…, v.
Step 2. Calculate the total amount of each confidential data bit in the new matrix P’ using Algorithm 3.
Algorithm 3 Confidential Data Calculation
|
FOR p = 1 : u ; q = 1 : v |
IF P’x,y hasSr
|
T(Sr) = T(Sr) +1 |
END |
END |
Step 3. Reassemble the confidential data bit
using (10).
4. Experimental Results
We performed extensive experiments to determine the efficacy of our proposed data-hiding technique. Assessment is conducted to determine hiding capacity and imperceptibility. We utilize the common test grayscale images, known as Airplane, Baboon, Barbara, Boat, Lena, and Peppers, as shown in
Figure 7a,d,g,j,m,p, respectively. The entirety test images are 512×512 pixels in size. We performed a binary confidential data which produced by a pseudo-random number generator.
The hiding capacity is identifies by the number of bits. While identifies by image quality. To assess image quality, the common used parameter is the peak signal-to-noise ratio (PSNR) as defined in Equation (11).
The mean square error (MSE) is defined in Equation (12).
Where
is the pixel in position of the
i-th row and the
j-th column of image
, and
is the pixel in the
i-th row and the
j-th column image
The experimental findings are presented in
Table 1, where PSNRs, MSEs, and hiding capacity are shown. According to the experimental findings, the image Lena and Pepper achieved the highest hiding capacity. Lena’s embedding capacity is 201364. Moreover, Pepper’s embedding capacity is 197632. On the other hand, in terms of image quality, the image Airplane and Baboon achieved the best image quality with less visual distortion. The airplane’s PSNR value is 38.25 dB, and Baboon’s PSNR value is 37.97 dB, respectively.
Further testing was performed by comparing our proposed method to the related method developed by Lee et al.’s scheme [
17]. The performance comparison of our proposed scheme and Lee et al.’s scheme can be seen in
Table 1. The scheme varied in different thresholds, i.e., TH=0, TH=5, TH=10, TH=20, TH=30, TH=40, and TH=50. It can be seen in Figure 13. Among the 6 test images, our scheme is superior in terms of image quality.
In summary, the main advantage of our proposed scheme:
The capacity of our scheme is between thresholds (TH 5 & TH10) of Lee et al.'s scheme [
17].
If the picture is complex (non-smooth), the capacity of our proposed method is more excellent than Lee
et al.'s scheme [
17].
The qualification of images (PSNR) is higher than Lee
et al.'s scheme [
17]. Moreover, our proposed method performs satisfying image quality in complex images.
Figure 8.
This is a figure. The graphic of performance comparison: (a) Airplane; (b) Baboon; (c) Barbara; (d) Boat; (e) Lena; (f) Pepper.
Figure 8.
This is a figure. The graphic of performance comparison: (a) Airplane; (b) Baboon; (c) Barbara; (d) Boat; (e) Lena; (f) Pepper.
5. Conclusions
This paper proposed a highly imperceptible data-hiding method in AMBTC compressed images with the combination theory. Using the combination theory in the image-compressed domain, we can achieve higher embedding capacity without considering the threshold value for determining the smooth or complex image block. Further, our proposed scheme performs well with a practical and low-computation algorithm. The experimental results show that the proposed scheme achieved satisfied modified compressed image quality and high hiding capacity. Moreover, the proposed scheme performs better than Lee et al.’s scheme [
17] in complex images.
For further development, our proposed scheme can be very effective and adopted appropriately in the medical image for securing electronic patient information because our proposed scheme induces invisible modification of image quality.
Author Contributions
The author's contribution to this manuscript is stated as follows: Conceptualization: Kurnia Anggriani; methodology: Kurnia Anggriani; software: Shu-Fen Chiou; validation: Nan-I Wu; formal analysis: Nan-I Wu; investigation: Shu-Fen Chiou; data curation: Shu-Fen Chiou; writing—original draft preparation: Kurnia Anggriani; writing—review and editing: Min-Shiang Hwang; project administration: Min-Shiang Hwang; funding acquisition: Min-Shiang Hwang. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by The Ministry of Science and Technology (Taiwan), grant number MOST 109-2221-E-468-011-MY3, MOST 108-2410-H-468-023, and MOST 108-2622-8-468-001-TM1. The APC was funded by The Ministry of Science and Technology (Taiwan).
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- M. Alhomoud, “Image steganography in spatial domain: Current status, techniques, and trends,” Intell. Autom. Soft Comput., vol. 27, no. 1, pp. 69–88, 2021. [CrossRef]
- N. Min-allah et al., “Quantum Image Steganography Schemes for Data Hiding : A Survey,” Appl. Sci., vol. 12, no. 10294, 2022. [CrossRef]
- K. Anggriani, N. Wu, and M. Hwang, “Research on Coverless Image Steganography,” Int. J. Netw. Secur., vol. 25, no. 1, pp. 25–31, 2023. [CrossRef]
- Dorobant and R. Brad, “Improving Lossless Image Compression with Contextual Memory,” Appl. Sci., vol. 9, no. 2681, 2019. [CrossRef]
- S. Q. Saleh, “Digital Image Steganalysis : Current Methodologies and Future Challenges,” IEEE Access, vol. 10, no. August, pp. 92321–92336, 2022. [CrossRef]
- Y. Linde, “An Algorithm for Vector Quantizer Design,” IEEE Trans. Commun., vol. 28, no. 1, pp. 84–95, 1980. [CrossRef]
- K. Chiranjeevi and U. R. Jena, “Image compression based on vector quantization using cuckoo search optimization technique,” Ain Shams Eng. J., vol. 9, no. 4, pp. 1417–1431, 2018. [CrossRef]
- P. P. Chavan, B. S. Rani, M. Murugan, and P. Chavan, “An image compression model via adaptive vector quantization: hybrid optimization algorithm,” Imaging Sci. J., vol. 68, no. 5–8, pp. 259–277, 2020. [CrossRef]
- E. Robert, O. Mitchell, J. Delp, “Image Compression Using Block Truncation Coding,” IEEE Trans. Commun., vol. 27, no. 9, pp. 1335–1341, 1979.
- K. Somasundaram, “Efficient Block Truncation Coding,” Int. J. Comput. Sci. Eng., vol. 2, no. 6, pp. 2163–2166, 2010.
- E. Q. Scheme, “An Enhanced Adaptive Block Truncation Coding with,” Appl. Sci., vol. 10, no. 7340, pp. 1–15, 2019. [CrossRef]
- K. Sau, R. Kumar, and A. Chanda, “Image Compression based on Block Truncation Coding using Clifford Algebra,” Procedia Technol., vol. 10, pp. 699–706, 2013. [CrossRef]
- M. D. Lema and R. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Trans. Commun., vol. 32, no. 10, 1984.
- Perfilieva and P. Hurtik, “The F-transform preprocessing for JPEG strong compression of high-resolution images,” Inf. Sci. (Ny)., vol. 550, pp. 221–238, 2021. [CrossRef]
- L. Mancini, G. Kourousias, A. Velez, J. F. Barrera, K. Bredies, and M. Holler, “Developed JPEG Algorithm Applied in Image Compression Developed JPEG Compression Algorithm Applied in Image,” in 2nd International Scientific Conference of Al-Ayen University (ISCAU-2020), 2020, pp. 1–17. [CrossRef]
- G. Hamano and S. Imaizumi, “Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images,” sensors, vol. 23, no. 3400, pp. 1–19, 2023. [CrossRef]
- C.-F. Lee, C.-C. Chang, and G. Li, “A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images,” KSII Trans. Internet Inf. Syst., vol. 14, no. 6, pp. 2554–2575, 2020. [CrossRef]
- Kim, “Separable Reversible Data Hiding in Encrypted AMBTC Images Using Hamming Code,” Appl. Sci., vol. 12, no. 8225, 2022. [CrossRef]
- Kim, D. Shin, and C. Yang, “Data Hiding Method for Color AMBTC Compressed Images Using Color Difference,” Appl. Sci., vol. 11, no. 3418, 2021. [CrossRef]
- Kim, “Dual Reversible Data Hiding Based on AMBTC Using Hamming Code and LSB Replacement,” Electronics, vol. 11, no. 3210, 2022. [CrossRef]
- C. Lin, J. Lin, and C. Chang, “Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding,” Electronics, vol. 10, no. 281, 2021. [CrossRef]
- Anggriani, N. Wu, and M. Hwang, “Research on Data Hiding Schemes for AMBTC Compressed Images,” Int. J. Netw. Secur., vol. 24, no. 6, pp. 1114–1123, 2022. [CrossRef]
- Y. Chen, C. Chang, C. Lin, and Z. Wang, “An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference,” Appl. Sci., vol. 11, no. 635, 2021. [CrossRef]
- Anggriani, S. Chiou, N. Wu, and M. Hwang, “A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments,” Electronics, vol. 12, no. 395, 2023. [CrossRef]
- N. Wu and M. Hwang, “Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images,” Displays, vol. 49, pp. 116–123, 2017. [CrossRef]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).