The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A High Capacity Data Hiding Scheme Using Modified AMBTC Compression Technique

In this paper, a data hiding scheme is proposed which modifies the Absolute Moment Block Truncation Coding (AMBTC) technique to embed a large amount of secret data. This scheme employs a user-defined threshold value to classify the AMBTC compressed blocks as complex block and smooth block. In the case of smooth blocks, the bit plane is replaced with the secret data bits. Later, the quantization levels are re-calculated so that distortion is minimized. While for complex blocks, the bit plane is reconstructed in which every pixel is represented by two bits instead of just one bit. Now, the secret data is embedded into the first LSB of the bit plane. Finally, four new quantization levels are calculated for preserving the closeness of the resultant block to the original block. Thus, the proposed scheme is able to utilize each and every pixel of the cover image to hide the secret data while maintaining the image quality. This scheme achieves 1 bit per pixel data hiding capacity for every image. Experimental results show that our scheme is superior to the other existing schemes in terms of both hiding capacity and image quality.


[1] Chang C. and Kieu T., “A Reversible Data Hiding Scheme Using Complementary Embedding Strategy,” Information Sciences, vol. 180, no. 16, pp. 3045-3058, 2010.

[2] Chang C., Lin C., and Fan Y., “Lossless Data Hiding for Color Images Based on Block Truncation Coding,” Pattern Recognition, vol. 41, no. 7, pp. 2347-2357, 2008.

[3] Chen J., Hong W., Chen T., and Shiu C., “Steganography for BTC Compressed Images Using no Distortion Technique,” The Imaging Science Journal, vol. 58, no. 4, pp. 177-185, 2010.

[4] Chuang J. and Chang C., “Using a Simple and Fast Image Compression Algorithm to Hide Secret Information,” International Journal of Computer and Application, vol. 28, no. 4, pp. 329-333, 2006.

[5] Cox I., Miller M., Bloom J., Fridrich J., and Kalker T., Digital Watermarking and Steganography, Morgan Kaufman, 2007.

[6] Khan Z., Shah M., Naeem M., Mahmood T., Khan S., Amin N., and Shahzad D., “Threshold- based Steganography: A Novel Technique for Improved Payload and SNR,” The International Arab Journal of Information Technology, vol. 13, no. 4, pp. 380-386, 2016.

[7] Langelaar G., Setyawan I., and Lagendijk R., “Watermarking Digital Image and Video Data: a State-of-the Overview,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000.

[8] Lema M. and Mitchell O., “Absolute Moment Block Truncation Coding and its Application to Color Images,” IEEE Transaction Communication, vol. 32, no. 10, pp. 1148-1157, 1984.

[9] Li C., Lu Z., and Su Y.,“Reversible Data Hiding for BTC-compressed Images Based on Bitplane Flipping and Histogram Shifting of Mean Tables,” Information Technology Journal, vol. 10, no. 7, pp. 1421-1426, 2011.

[10] Lin C., Liu X., Tai W., and Yuan S., “A Novel Reversible Data Hiding Scheme Based on AMBTC Compression Technique,” Multimedia Tools Appl, vol. 74, no. 11, pp. 3823-3842, 2015.

[11] Lin I., Lin Y., and Wang C., “Hiding Data in Spatial Domain Images with Distortion Tolerance,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 458-464, 2009.

[12] Lu Z., Wang J., and Liu B., “An Improved Lossless Data Hiding Scheme based on Image VQ-Index Residual Value Coding,” Journal of Systems and Software, vol. 82, no. 6, pp. 1016- 024, 2009.

[13] Ou D. and Sun W., “High Payload Image Steganography with Minimum Distortion based on Absolute Moment Block Truncation Coding,” Multimedia Tools and Applications, vol. 74, no. 21, pp. 9117-9139, 2015.

[14] Pan J., Li W., and Lin C., “Novel Reversible Data Hiding Scheme for AMBTC-Compressed Images by Reference Matrix,” in Proceedings of Multidisciplinary Social Networks Research, Kaohsiung, pp. 427-436, 2014.

[15] Petitcolas F., Anderson R., and Kuhn M., “Information Hiding-A Survey,” in Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.

[16] Sun W., Lu Z., Wen Y., Yu F., and Shen R., “High-performance Reversible Data Hiding for Block Truncation Coding Compressed Images,” Signal Image and Video Processing, vol. 7, no. 2, pp. 297-306, 2013.

[17] Wang K., Lu Z., and Hu Y., “A High Capacity Lossless Data Hiding Scheme for JPEG Images,” Journal of Systems and Software, vol. 86, no. 7, pp. 1965-1975, 2013.

[18] Xuan G., Shi Y., Yao Q., Ni Z., Yang C., and Gao J., “Lossless Data Hiding using Histogram Shifting Method based on Integer Wavelets,” International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Jeju Island, pp. 323-332, 2006.

[19] Yang B., Schmucker M., Funk W., Brush C., and Sun S., “Integer DCT-Based Reversible Watermarking for Images Using Companding Technique,” in Proceedings of International Journal of Electronics Communication, San Jose, pp. 814-826, 2004.

[20] Zhang Y., Guo S., Lu Z., and Luo H., “Reversible Data Hiding for BTC-compressed Images based on Lossless Coding of Mean Tables,” IEICE Transactions on Communications, vol. 96, no. 2, pp. 624-631, 2013. A High Capacity Data Hiding Scheme Using Modified AMBTC Compression Technique 155 Aruna Malik, received her B.Tech. in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow, India and M.Tech. in Computer Science and Engineering from National Institute of Technology, Jalandhar, Punjab, India. Currently, she is pursuing her doctoral degree in Computer Science and Engineering, at National Institute of Technology, Jalandhar, Punjab, India. Her research lies in the area of text and image based steganogrography, digital watermarking and image processing. Geeta Sikka, received her Ph.D in Computer Science and Engineering, from National Institute of Technology, Jalandhar, India. She did her Master’s degree in Computer Science from Punjab Agricultural University, Ludhiana. She is presently working as Associate Professor in the Department of Computer Science and Engineering at National Institute of Technology, Jalandhar. Her research interests are Software Engineering, Databases and Data mining. Harsh Verma, received his doctorate in Numerical Computing from Punjab Technical University Punjab, India. Currently, he is associate Professor in Computer Science and Engineering, National Institute of Technology, Jalandhar, India. His research interest includes in numerical computing, information security and computer networks. He has published various papers in national and international journal and conferences. He has attended various national and international workshop, training schools, and other technical activity during his academic carrier.