Skip to main content
Top

2017 | OriginalPaper | Chapter

An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images

Authors : Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes an efficient reversible information hiding method based on AMBTC compressed images. At present, most digital images are stored and transmitted in compressed form, so research and development of such a scheme is necessary. Hong et al. proposed a reversible information hiding based approach based on AMBTC compression of images to provide considerable embedding capacity and effectively reduce the bit-rate. However, it did not carry out a detailed categorization of the error value or adopt the most suitable method for category information encoding, where error value is the difference of the original quantization value and the prediction quantization value. So there’s possibility to reduce the bit-rate. In this paper, we propose an Improved Centralized Error Division (ICED) technique to conduct a more detailed categorization of the error value. In addition, we also adopt an optimal Huffman code to encode category information, so as to further reduce the bit-rate. Our experimental results show that our proposed approach has an equal embedding capacity as Hong et al.’s method and is higher than other relevant work. In addition, the proposed scheme has a lower bit-rate than Hong et al.’s method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 435–442 (2017) Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 435–442 (2017)
2.
go back to reference Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18(2), 313–320 (2017) Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18(2), 313–320 (2017)
3.
go back to reference Li, J., Li, X., et al.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)CrossRef Li, J., Li, X., et al.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)CrossRef
4.
go back to reference Zhou, Z., Wang, Y., et al.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017)CrossRef Zhou, Z., Wang, Y., et al.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017)CrossRef
5.
go back to reference Guo, P., et al.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–935 (2014) Guo, P., et al.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–935 (2014)
6.
go back to reference Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Pers. Commun. 78(1), 231–246 (2014)CrossRef Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Pers. Commun. 78(1), 231–246 (2014)CrossRef
7.
go back to reference Chen, B., Shu, H., et al.: Color image analysis by quaternion zernike moments. J. Math. Imaging Vis. 51(1), 124–144 (2015)CrossRefMATH Chen, B., Shu, H., et al.: Color image analysis by quaternion zernike moments. J. Math. Imaging Vis. 51(1), 124–144 (2015)CrossRefMATH
8.
go back to reference Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sensor Netw. 23(4), 265–278 (2017)CrossRef Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sensor Netw. 23(4), 265–278 (2017)CrossRef
9.
go back to reference Tsai, C.L., Chiang, H.F., et al.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn. 38(11), 1993–2006 (2005)CrossRef Tsai, C.L., Chiang, H.F., et al.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn. 38(11), 1993–2006 (2005)CrossRef
10.
go back to reference Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process. Image Commun. 39, 226–233 (2015)CrossRef Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process. Image Commun. 39, 226–233 (2015)CrossRef
11.
go back to reference Barton, J.M.: Method and apparatus for embedding authentication information within digital data. US, US6523114 (2003) Barton, J.M.: Method and apparatus for embedding authentication information within digital data. US, US6523114 (2003)
12.
go back to reference Hong, W., et al.: An efficient reversible data hiding method for AMBTC compressed images. Multimedia Tools Appl. 76(4), 5441–5460 (2016)CrossRef Hong, W., et al.: An efficient reversible data hiding method for AMBTC compressed images. Multimedia Tools Appl. 76(4), 5441–5460 (2016)CrossRef
13.
go back to reference Chen, J., et al.: Steganography for BTC compressed images using no distortion technique. Imaging Sci. J. 58(4), 177–185 (2010)CrossRef Chen, J., et al.: Steganography for BTC compressed images using no distortion technique. Imaging Sci. J. 58(4), 177–185 (2010)CrossRef
14.
go back to reference Sun, W., et al.: High performance reversible data hiding for block truncation coding; compressed images. Signal Image Video Process. 7(2), 297–306 (2013)CrossRef Sun, W., et al.: High performance reversible data hiding for block truncation coding; compressed images. Signal Image Video Process. 7(2), 297–306 (2013)CrossRef
Metadata
Title
An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images
Authors
Yi Puyang
Zhaoxia Yin
Guorui Feng
Andrew K. Abel
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-68505-2_5

Premium Partner