A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images

Authors

  • Nguyen Duc Tuan School of Interdisciplinary Sciences and Arts, Vietnam National University, Hanoi

DOI:

https://doi.org/10.54654/isj.v3i23.1063

Keywords:

Reversible Data Hiding, AMBTC compressed images, bit selection strategy, security enhancement

Tóm tắt

Reversible Data Hiding (RDH) is an approach that has garnered significant attention from researchers over the past two decades. In this paper, an Absolute Moment Block Truncation Coding (AMBTC)-based RDH approach is proposed. To increase the embedding capacity (EC), the approach utilizes the high mean and low mean values for data hiding. Additionally, a binary matrix from the AMBTC compressed code is employed to embed the given message bits into encrypted information arrays using the XOR (exclusive OR) operator. This mechanism enhances the security of the hidden message through a secure bit selection method. Consequently, the embedding capacity of the proposed RDH scheme can exceed 98,301 bits when an image block of size 4 × 4 pixels is used. Moreover, the visual quality of the stego-images produced by the proposed RDH scheme surpasses that of state-of-the-art RDH approaches.

Downloads

Download data is not yet available.

References

Y. Pan, J. Ni, Q. Liu, W. Su, and J. Huang, “Efficient jpeg image steganography using pairwise conditional random field model,” Signal Processing, vol. 221, p. 109493, Aug. 2024. doi: http://dx.doi.org/10.1016/j.sigpro.2024.109493.

D. Laishram and T. Tuithung, “A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (beass),” Multimedia Tools and Applications, vol. 80, no. 1, pp. 831–854, Sep. 2020. doi: http://dx.doi.org/10.1007/s11042-020-09519-9.

W. Wu and H. Li, “A novel scheme for random sequential high-capacity data hiding based on pvd and lsb,” Signal, Image and Video Processing, vol. 18, no. 3, pp. 2277–2287, Dec. 2023. doi: http://dx.doi.org/10.1007/s11760-023-02900-9.

R. RoselinKiruba and T. S. Sharmila, “A novel data hiding by image interpolation using edge quad-tree block complexity,” The Visual Computer, vol. 39, no. 1, pp. 59–72, Oct. 2021. doi: http://dx.doi.org/10.1007/s00371-021-02312-1.

C.-C. Lin, X.-L. Liu, W.-L. Tai, and S.M. Yuan, “A novel reversible data hiding scheme based on ambtc compression technique,” Multimedia Tools and Applications, vol. 74, no. 11, pp. 3823–3842, Dec. 2013. doi: http://dx.doi.org/10.1007/s11042-013-1801-5.

W. Hong, Y.-B. Ma, H.-C. Wu, and T.-S. Chen, “An efficient reversible data hiding method for ambtc compressed images,” Multimedia Tools and Applications, vol. 76, no. 4, pp. 5441–5460, Oct. 2016. doi: http://dx.doi.org/10.1007/s11042016-4032-8.

W. Hong, X. Zhou, and S. Weng, “Joint adaptive coding and reversible data hiding for ambtc compressed images,” Symmetry, vol. 10, no. 7, p. 254, Jul. 2018. doi: http://dx.doi.org/10.3390/sym10070254.

J. Lin, C.-C. Lin, and C.-C. Chang, “Reversible steganographic scheme for ambtc-compressed image based on (7,4) hamming code,” Symmetry, vol. 11, no. 10, p. 1236, Oct. 2019. doi: http://dx.doi.org/10.3390/sym11101236.

G.-D. Su, C.-C. Chang, and C.-C. Lin, “A high capacity reversible data hiding in encrypted ambtc-compressed images,” IEEE Access, vol. 8, pp. 26984–27000, 2020. doi: http://dx.doi.org/10.1109/ACCESS.2020.2966234.

J. Lin, S. Weng, T. Zhang, B. Ou, and C.-C. Chang, “Two-layer reversible data hiding based on ambtc image with (7, 4) hamming code,” IEEE Access, vol. 8, pp. 21534–21548, 2020. doi: http://dx.doi.org/10.1109/ACCESS.2019.2962230.

X. Zhang, Z. Pan, Q. Zhou, G. Fan, and J. Dong, “A reversible data hiding method based on bitmap prediction for ambtc compressed hyperspectral images,” Journal of Information Security and Applications, vol. 81, p. 103697, Mar. 2024. doi: http://dx.doi.org/10.1016/j.jisa.2023.103697.

Z. Yin, X. Niu, X. Zhang, J. Tang, and B. Luo, “Reversible data hiding in encrypted ambtc images,” Multimedia Tools and Applications, vol. 77, no. 14, pp. 18067–18083, Aug. 2017. doi: http://dx.doi.org/10.1007/s11042-017-4957-6.

R. Kumar and A. Malik, “Multimedia information hiding method for AMBTC compressed images using LSB substitution technique,” Multimed Tools Appl, vol. 82, no. 6, pp. 8623–8642, 2023.

X. Wu and C.-N. Yang, “Partial reversible ambtc-based secret image sharing with steganography,” Digital Signal Processing, vol. 93, pp. 22–33, Oct. 2019. doi: http://dx.doi.org/10.1016/j.dsp.2019.06.016.

Z. Hui and Q. Zhou, “A reversible data hiding method for AMBTC compressed image without expansion inside stego format,” Transactions on Internet and Information Systems, vol. 14, no. 11, 2020.

X. Zhou, G. Yang, W. Hong, K. S. Chen, and T.-S. Chen, “An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique,” Multimed Tools Appl, vol. 82, no. 10, pp. 15593–15612, 2023.

J.-C. Liu, Y. Lin, C.-C. Chang, and C. Chang, “A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility,” Multimedia Tools and Applications, Jul. 2024. Available: http://dx.doi.org/10.1007/s11042-024-19752-1

A. Weber. (1997) The usc-sipi image database. Signal and Image Processing Institute of the. University of Southern California. Access time: 15/12/2024. https://sipi.usc.edu/database/.

T. P. Patrick Bas, Tomas Filler. (2008, April) Bows-2 image database. Access time: 10/12/2024. http://bows2.eclille.fr/BOWS2OrigEp3.tgz.

Kodak, “The kodak color image dataset,” Online, 11, 1999. Access time: 15/12/2024. https://r0k.us/graphics/kodak/.

D. R. I. M. Setiadi, “Psnr vs ssim: imperceptibility quality assessment for image steganography,” Multimedia Tools and Applications, vol. 80, no. 6, pp. 8423–8444, Nov. 2020. doi: http://dx.doi.org/10.1007/s11042-020-10035-z.

A. Saeed, Fawad, M. J. Khan, H. Shahid, S. I. Naqvi, M. A. Riaz, M. S. Khan, and Y. Amin, “An accurate texture complexity estimation for quality-enhanced and secure image steganography,” IEEE Access, vol. 8, pp. 21613–21630, 2020. doi: http://dx.doi.org/10.1109/ACCESS.2020.2968217.

G.-D. Su, C.-C. Chang, and C.-C. Lin, “A high capacity reversible data hiding in encrypted AMBTC-compressed images,” IEEE Access, vol. 8, pp. 26984–27000, 2020.

H.-Y. Wang, H.-J. Lin, X.-Y. Gao, W.-H. Cheng, and Y.-Y. Chen, “Reversible ambtcbased data hiding with security improvement by chaotic encryption,” IEEE Access, vol. 7, pp. 38337–38347, 2019. doi: http://dx.doi.org/10.1109/ACCESS.2019.2906500.

J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432–444, Apr. 2012. doi: http://dx.doi.org/10.1109/TIFS.2011.2175919

T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215–224, Jun. 2010. doi: http://dx.doi.org/10.1109/TIFS.2010.2045842.

A. Kozachok and S. Kopylov, “Robust text watermarking based on line shifting,” Journal of Science and Technology on Information security, vol. 7, no. 1, pp. 3–13, Apr. 2020. doi: https://doi.org/10.54654/isj.v7i1.50.

Downloads

Abstract views: 1062 / PDF downloads: 28

Published

2024-12-19

How to Cite

Tuan, N. D. (2024). A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images. Journal of Science and Technology on Information Security, 3(23), 82-96. https://doi.org/10.54654/isj.v3i23.1063

Issue

Section

Papers