A difference matching technique for data embedment based on absolute moment block truncation coding

被引:2
|
作者
Hong, Wien [1 ]
Li, Yizhen [1 ]
Weng, Shaowei [2 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Comp Engn, Nanfang Coll, Guangzhou, Guangdong, Peoples R China
[2] Guangdong Univ Technol, Sch Informat Engn, Guangzhou, Guangdong, Peoples R China
关键词
AMBTC; Data embedding; Difference matching; STEGANOGRAPHY;
D O I
10.1007/s11042-018-6983-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an optimized data embedding method based on Huang et al.'s work for absolute moment block truncation coding (AMBTC) is proposed. Huang et al.'s work successfully exploits the difference of quantization levels (QLs) for data embedment and has an excellent embedding performance. However, the modified QLs are not adjusted to minimize the distortion. In some rare cases, they might exceed the grayscale range. Moreover, the order of QLs in smooth blocks is not utilized for data embedment, losing the chance to embed one additional bit without deteriorating the image block. We propose a method to give analytical solutions to adjust QLs such that the distortions in both smooth and complex blocks are minimized. A subtle mechanism is also provided to ensure that no QLs will overflow or underflow. Moreover, the order of QLs is utilized in data embedment to further increase the payload without sacrificing the image quality. The experimental results reveal that the proposed method offers a better image quality over Huang et al.'s and other state-of-the-art works while providing a comparable or larger payload.
引用
收藏
页码:13987 / 14006
页数:20
相关论文
共 42 条
  • [31] Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting
    Hong, Wien
    Zheng, Shuozhen
    Chen, Tung-Shou
    Huang, Chien-Che
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (06): : 2817 - 2834
  • [32] Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion
    Ou, Duanhao
    Wu, Xiaotian
    Dai, Lu
    Sun, Wei
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 123 - 138
  • [33] An Image Secret Sharing Technique with Block Based Image Coding
    Das, Sujit Kumar
    Dhara, Bibhas Chandra
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 648 - 652
  • [34] Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding
    Xia, Ting-Ting
    Lin, Juan
    Chang, Chin-Chen
    Lu, Tzu-Chuen
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (04) : 383 - 393
  • [35] Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees
    Chang, Chin-Chen
    Thai-Son Nguyen
    Lin, Chia-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2572 - 2589
  • [36] User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion
    Qu, Duanhao
    Ye, Lili
    Sun, Wei
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 29 : 46 - 60
  • [37] High fidelity based reversible data hiding using modified LSB matching and pixel difference
    Sahu, Aditya Kumar
    Swain, Gandharba
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (04) : 1395 - 1409
  • [38] Distortion less Reversible Data Hiding based on Dual Repeat Accumulate Coding Technique
    Vanmathi, C.
    Prabu, S.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 331 - 334
  • [39] Proposition of new secure data communication technique based on Huffman coding, chaos and LSB
    Bouguessa, Abdelkader
    Said, Naima Hadj
    Pacha, Adda Ali
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2021, 13 (2-3) : 343 - 365
  • [40] A new efficient block matching data hiding method based on scanning order selection in medical images
    Aydogan, Turgay
    Bayilmis, Cuneyt
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (01) : 461 - 473