A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images
DOI:
https://doi.org/10.54654/isj.v3i23.1063Keywords:
Reversible Data Hiding, AMBTC compressed images, bit selection strategy, security enhancementTóm tắt
Reversible Data Hiding (RDH) is an approach that has garnered significant attention from researchers over the past two decades. In this paper, an Absolute Moment Block Truncation Coding (AMBTC)-based RDH approach is proposed. To increase the embedding capacity (EC), the approach utilizes the high mean and low mean values for data hiding. Additionally, a binary matrix from the AMBTC compressed code is employed to embed the given message bits into encrypted information arrays using the XOR (exclusive OR) operator. This mechanism enhances the security of the hidden message through a secure bit selection method. Consequently, the embedding capacity of the proposed RDH scheme can exceed 98,301 bits when an image block of size 4 × 4 pixels is used. Moreover, the visual quality of the stego-images produced by the proposed RDH scheme surpasses that of state-of-the-art RDH approaches.
Downloads
References
Y. Pan, J. Ni, Q. Liu, W. Su, and J. Huang, “Efficient jpeg image steganography using pairwise conditional random field model,” Signal Processing, vol. 221, p. 109493, Aug. 2024. doi: http://dx.doi.org/10.1016/j.sigpro.2024.109493.
D. Laishram and T. Tuithung, “A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (beass),” Multimedia Tools and Applications, vol. 80, no. 1, pp. 831–854, Sep. 2020. doi: http://dx.doi.org/10.1007/s11042-020-09519-9.
W. Wu and H. Li, “A novel scheme for random sequential high-capacity data hiding based on pvd and lsb,” Signal, Image and Video Processing, vol. 18, no. 3, pp. 2277–2287, Dec. 2023. doi: http://dx.doi.org/10.1007/s11760-023-02900-9.
R. RoselinKiruba and T. S. Sharmila, “A novel data hiding by image interpolation using edge quad-tree block complexity,” The Visual Computer, vol. 39, no. 1, pp. 59–72, Oct. 2021. doi: http://dx.doi.org/10.1007/s00371-021-02312-1.
C.-C. Lin, X.-L. Liu, W.-L. Tai, and S.M. Yuan, “A novel reversible data hiding scheme based on ambtc compression technique,” Multimedia Tools and Applications, vol. 74, no. 11, pp. 3823–3842, Dec. 2013. doi: http://dx.doi.org/10.1007/s11042-013-1801-5.
W. Hong, Y.-B. Ma, H.-C. Wu, and T.-S. Chen, “An efficient reversible data hiding method for ambtc compressed images,” Multimedia Tools and Applications, vol. 76, no. 4, pp. 5441–5460, Oct. 2016. doi: http://dx.doi.org/10.1007/s11042016-4032-8.
W. Hong, X. Zhou, and S. Weng, “Joint adaptive coding and reversible data hiding for ambtc compressed images,” Symmetry, vol. 10, no. 7, p. 254, Jul. 2018. doi: http://dx.doi.org/10.3390/sym10070254.
J. Lin, C.-C. Lin, and C.-C. Chang, “Reversible steganographic scheme for ambtc-compressed image based on (7,4) hamming code,” Symmetry, vol. 11, no. 10, p. 1236, Oct. 2019. doi: http://dx.doi.org/10.3390/sym11101236.
G.-D. Su, C.-C. Chang, and C.-C. Lin, “A high capacity reversible data hiding in encrypted ambtc-compressed images,” IEEE Access, vol. 8, pp. 26984–27000, 2020. doi: http://dx.doi.org/10.1109/ACCESS.2020.2966234.
J. Lin, S. Weng, T. Zhang, B. Ou, and C.-C. Chang, “Two-layer reversible data hiding based on ambtc image with (7, 4) hamming code,” IEEE Access, vol. 8, pp. 21534–21548, 2020. doi: http://dx.doi.org/10.1109/ACCESS.2019.2962230.
X. Zhang, Z. Pan, Q. Zhou, G. Fan, and J. Dong, “A reversible data hiding method based on bitmap prediction for ambtc compressed hyperspectral images,” Journal of Information Security and Applications, vol. 81, p. 103697, Mar. 2024. doi: http://dx.doi.org/10.1016/j.jisa.2023.103697.
Z. Yin, X. Niu, X. Zhang, J. Tang, and B. Luo, “Reversible data hiding in encrypted ambtc images,” Multimedia Tools and Applications, vol. 77, no. 14, pp. 18067–18083, Aug. 2017. doi: http://dx.doi.org/10.1007/s11042-017-4957-6.
R. Kumar and A. Malik, “Multimedia information hiding method for AMBTC compressed images using LSB substitution technique,” Multimed Tools Appl, vol. 82, no. 6, pp. 8623–8642, 2023.
X. Wu and C.-N. Yang, “Partial reversible ambtc-based secret image sharing with steganography,” Digital Signal Processing, vol. 93, pp. 22–33, Oct. 2019. doi: http://dx.doi.org/10.1016/j.dsp.2019.06.016.
Z. Hui and Q. Zhou, “A reversible data hiding method for AMBTC compressed image without expansion inside stego format,” Transactions on Internet and Information Systems, vol. 14, no. 11, 2020.
X. Zhou, G. Yang, W. Hong, K. S. Chen, and T.-S. Chen, “An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique,” Multimed Tools Appl, vol. 82, no. 10, pp. 15593–15612, 2023.
J.-C. Liu, Y. Lin, C.-C. Chang, and C. Chang, “A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility,” Multimedia Tools and Applications, Jul. 2024. Available: http://dx.doi.org/10.1007/s11042-024-19752-1
A. Weber. (1997) The usc-sipi image database. Signal and Image Processing Institute of the. University of Southern California. Access time: 15/12/2024. https://sipi.usc.edu/database/.
T. P. Patrick Bas, Tomas Filler. (2008, April) Bows-2 image database. Access time: 10/12/2024. http://bows2.eclille.fr/BOWS2OrigEp3.tgz.
Kodak, “The kodak color image dataset,” Online, 11, 1999. Access time: 15/12/2024. https://r0k.us/graphics/kodak/.
D. R. I. M. Setiadi, “Psnr vs ssim: imperceptibility quality assessment for image steganography,” Multimedia Tools and Applications, vol. 80, no. 6, pp. 8423–8444, Nov. 2020. doi: http://dx.doi.org/10.1007/s11042-020-10035-z.
A. Saeed, Fawad, M. J. Khan, H. Shahid, S. I. Naqvi, M. A. Riaz, M. S. Khan, and Y. Amin, “An accurate texture complexity estimation for quality-enhanced and secure image steganography,” IEEE Access, vol. 8, pp. 21613–21630, 2020. doi: http://dx.doi.org/10.1109/ACCESS.2020.2968217.
G.-D. Su, C.-C. Chang, and C.-C. Lin, “A high capacity reversible data hiding in encrypted AMBTC-compressed images,” IEEE Access, vol. 8, pp. 26984–27000, 2020.
H.-Y. Wang, H.-J. Lin, X.-Y. Gao, W.-H. Cheng, and Y.-Y. Chen, “Reversible ambtcbased data hiding with security improvement by chaotic encryption,” IEEE Access, vol. 7, pp. 38337–38347, 2019. doi: http://dx.doi.org/10.1109/ACCESS.2019.2906500.
J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432–444, Apr. 2012. doi: http://dx.doi.org/10.1109/TIFS.2011.2175919
T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215–224, Jun. 2010. doi: http://dx.doi.org/10.1109/TIFS.2010.2045842.
A. Kozachok and S. Kopylov, “Robust text watermarking based on line shifting,” Journal of Science and Technology on Information security, vol. 7, no. 1, pp. 3–13, Apr. 2020. doi: https://doi.org/10.54654/isj.v7i1.50.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).