Data Hiding Method for Color AMBTC Compressed Images Using Color Difference
Abstract
:1. Introduction
2. Related Works
3. Preliminaries
3.1. Color AMBTC
- Step 1:
- The original image of size is divided into non-overlapping blocks (P) of size (let m = 4) and each block is processed individually. Also let us say .
- Step 2:
- For each block , the mean of the pixels constituting is calculated and assigned to (Equation (1)), where the variable i denotes and j denotes .
- Step 3:
- A bit-plane for the block is caused by a simple calculation of Equation (2), i.e., if the pixel is greater than equal to the mean then it is assigned a ‘1’, otherwise it is assigned a ‘0’. As a result, a bitmap M consisting of 0s and 1s is obtained.
- Step 4:
- The bitmap M is divided into two sets, and , where and . and are , , respectively. Two values of t and are each number of pixels of group ‘0’ and ‘1’. The means of pixels and in the two groups represent the quantization levels of groups ‘0’ and ‘1’, respectively. The two quantization levels are calculated by Equations (3) and (4).
- Step 5:
- Two quantization levels and and a bitmap M are added to a trio, i.e., .
- Step 6:
- Steps 2 to 5 are repeated until encoding is completed for all blocks.
3.2. Optimal Pixel Adjustment Process (OPAP)
- (): if , then ; else ;
- (): ;
- (): if , then ; else .
4. Proposed Method
4.1. The Proposed Color AMBTC Using k-Means
- Input:
- Original image, ; The image size,
- Output:
- Color AMBTC compressed image,
- Step 1:
- The original image sized is divided into non-overlapping blocks () of size (let m = 4) and each block is processed individually. Also let us say . Here, the variable i denotes and j denotes .
- Step 2:
- For each block , transform a block of RGB layer into a common block containing the luminance using Equation (6), where is a pixel.
- Step 3:
- Apply the k-means clustering algorithm to the pixels of . Here, the number of clusters is k (). After executing the k-means, a common bitmap M composed of {00,01,10} is obtained as in Figure 2.
- Step 4:
- The common bitmap M is divided into three sets: , and , where and . Here, , and are , , and . , , and represent the numbers of pixels in each group for ‘00’, ‘01’, and ‘10’. , , and denote quantization levels for each group. Using Equations (7)–(9), the quantization levels of R, G, and B are , , and can be obtained. In the following equations, the variables such as R, G, and B refer to the R, G, and B layers of block and each layer consists of pixels.
- Step 5:
- To compress the quantized values for each of R, G, and B once again, the LSB is compressed in a way that does not use the LSBs for , , and . To do this, the LSBs are removed by Equation (10), where is a truncation function.The expression range of the quantized pixel value Q is .
- Step 6:
- The compressed data is added to the , i.e., . Repeat Steps 2 to 6 until all blocks are extruded.
4.2. DH Embedding Procedure
- Input:
- Color AMBTC compressed image, ; block size, ; secret bits,
- Output:
- Color AMBTC marked image,
- Step 1:
- Read a block from and assign it to , where .
- Step 2:
- The quantization levels of block is assigned to the variable , where the range of j is and . Thereafter, LSB and 2LSB are extracted from using Equation (12). Next, the secret bit (1 bit) is concealed in the 2LSB of according to the rule of Equation (13), i.e., , where f is a function of the embedding logic.After performing Step 2, nine bits are hidden in the 2LSB of nine quantization levels.
- Step 3:
- Embedding the secret bit in XOR (2LSB ⊕ LSB) of depends on the OPAP rule (Equation (14)), where 2LSB ⊕ LSB is . Since the pixel value of can be changed by Equation (13), Equations (11) and (12) are recalculated to extract 2LSB and LSB again. The function call for Equation (14) is , where f is a function of the embedding logic.
- Step 4:
- A critical condition to embed a stream of secret bits into a common bit-plane is allowed when the difference between two quantization levels is less than T. If , read a common bit-plane M from the block and perform Equation (15) to embed the secret bits into M, i.e., , where f is a function of the logic.A threshold value T is a condition for the embedding secret bits in a common bitmap as well as controls the quality of color AMBTC image.
- Step 5:
- Steps 1 to 5 are repeated until all blocks have been processed.
4.3. DH Extraction Procedure
- Input:
- The marked image, ; block size, ;.
- Output:
- Extracted secret bits,
- Step 1:
- Read a block from and assign it to , where .
- Step 2:
- To extract hidden bits in nine quantization levels, Equation (16) is executed.
- Step 3:
- If , the common bitmap in block is assigned to variable M. Then, 16-bit data is extracted using Equation (17), where j is , i.e., , where f is a function of the logic.
- Step 4:
- To extract hidden data from all blocks, the process of Steps 1 to 3 is repeated.
4.4. AMBTC Compression and DH Example
5. Experimental Results
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Original Image | |
AMBTC Marked Image | |
A Block of an AMBTC | |
M | A block of common bitmap |
A Quantization Level | |
LSB | Least Significant Bit |
DCT | Discrete Cosine Transform |
BTC | Block Truncation Coding |
AMBTC | Absolute Moment BTC |
DH | Data Hiding |
OPAP | Optimal Pixel Adjustment Process |
References
- Yang, H.; Kot, A.C. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Process. Lett. 2006, 13, 741–744. [Google Scholar] [CrossRef]
- Kim, C.; Yang, C.N. Self-embedding fragile watermarking scheme to detect image tampering ssing AMBTC and OPAP approaches. Appl. Sci. 2021, 11, 1146. [Google Scholar] [CrossRef]
- Jayapandiyan, J.R.; Kavitha, C.; Sakthivel, K. Enhanced least significant bit replacement algorithm in spatial domain of steganography using character sequence optimization. IEEE Access 2020, 8, 136537–136545. [Google Scholar] [CrossRef]
- Yang, C.; Weng, C.; Wang, S.; Sun, H. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans. Inf. Forensics Secur. 2008, 3, 488–497. [Google Scholar] [CrossRef]
- Lin, S.D.; Chen, C.F. A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 2000, 46, 415–421. [Google Scholar] [CrossRef]
- Leng, L.; Zhang, J.; Khan, M.K.; Chen, X.; Alghathbar, K. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int. J. Phys. Sci. 2010, 5, 2543–2554. [Google Scholar]
- Leng, L.; Li, M.; Kim, C.; Bi, X. Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed. Tools Appl. 2017, 76, 333–354. [Google Scholar] [CrossRef]
- Wang, S.; Zheng, D.; Zhao, J.; Tam, W.J.; Speranza, F. Adaptive Watermarking and Tree Structure Based Image Quality Estimation. IEEE Trans. Multimed. 2014, 16, 311–325. [Google Scholar] [CrossRef]
- Zhang, X.P.; Li, K. Comments on “An SVD-based watermarking scheme for protecting rightful Ownership”. IEEE Trans. Multimed. 2005, 7, 593–594. [Google Scholar] [CrossRef] [Green Version]
- Delp, E.; Mitchell, O. Image compression using block truncation coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
- Lema, M.D.; Mitchell, O.R. Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
- Chuang, J.C.; Chang, C.C. Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. Appl. 2006, 28, 329–333. [Google Scholar]
- Chen, J.; Hong, W.; Chen, T.S.; Shiu, C.W. Steganography for BTC compressed images using no distortion technique. Imaging Sci. J. 2013, 58, 177–185. [Google Scholar] [CrossRef]
- Ou, D.; Sun, W. High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 2015, 74, 9117–9139. [Google Scholar] [CrossRef]
- Huang, Y.H.; Chang, C.C.; Chen, Y.H. Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed. Tools Appl. 2017, 76, 6159–6174. [Google Scholar] [CrossRef]
- Kim, C.; Shin, D.-K.; Yang, C.-N.; Leng, L. Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code. Appl. Sci. 2020, 10, 5336. [Google Scholar] [CrossRef]
- Sinaga, K.P.; Yang, M. Unsupervised K-Means clustering algorithm. IEEE Access 2020, 8, 80716–80727. [Google Scholar] [CrossRef]
- Wang, R.Z.; Lin, C.F.; Lin, J.C. Hiding data in images by optimal moderately significant-bit replacement. IEE Electron. Lett. 2000, 36, 2069–2070. [Google Scholar] [CrossRef] [Green Version]
- Wu, Y.; Coll, D.C. Single Bit-map Block Truncation Coding of Color Images. IEEE J. Sel. Areas Commun. 1992, 10, 952–959. [Google Scholar] [CrossRef]
- Ma, X.; Lin, J. Imperceptibility Evaluation for Color Stego Image. In Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, 12–14 September 2009; pp. 783–786. [Google Scholar]
- Yang, C.K.; Lin, J.C.; Tsai, W.H. Color image compression by moment-preserving and block truncation coding techniques. IEEE Trans. Commun. 1997, 45, 1513–1516. [Google Scholar] [CrossRef]
- Chang, C.C.; Chen, T.S.; Chung, J.C. A colour image compression scheme based on two layer absolute moment block truncation coding. Imaging Sci. J. 2000, 48, 53–62. [Google Scholar] [CrossRef]
- Hu, Y.C.; Su, B.H.; Tsai, P.Y. Color image coding scheme using absolute moment block truncation coding and block prediction technique. Imaging Sci. J. 2008, 56, 254–270. [Google Scholar] [CrossRef]
- Bae, S.; Kim, M. A novel SSIM index for image quality assessment using a new luminance adaptation effect model in pixel intensity domain. In Proceedings of the 2015 Visual Communications and Image Processing (VCIP), Singapore, 13–16 December 2015; pp. 1–4. [Google Scholar]
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
CAMBTC (96 Bits) 2Q/B | PROPOSED (95 Bits) 3Q/B | |||||
---|---|---|---|---|---|---|
SSIM | PSNR | SSIM | PSNR | |||
Lena | 11.5419 | 0.9887 | 37.8912 | 10.6977 | 0.9914 | 39.6064 |
Pepper | 12.4374 | 0.9882 | 37.4795 | 12.2976 | 0.9891 | 38.476 |
Airplane | 10.3398 | 0.9346 | 37.1915 | 8.5637 | 0.9312 | 40.4584 |
Lake | 18.4897 | 0.9618 | 34.0499 | 17.0456 | 0.9623 | 35.316 |
Baboon | 29.7421 | 0.9253 | 31.1472 | 26.1272 | 0.9322 | 32.2806 |
CAMBTC | T = 5 | T = 10 | T = 15 | T = 20 | |||||
EC | EC | EC | EC | ||||||
Lena | 11.5419 | 239,633 | 12.2081 | 438,225 | 14.7086 | 504,081 | 16.0868 | 536,273 | 17.0192 |
Pepper | 12.4374 | 170,193 | 12.9032 | 384,689 | 15.4278 | 500,129 | 17.6682 | 539,313 | 18.7706 |
Airplane | 10.3398 | 365,105 | 11.6417 | 460,449 | 12.7021 | 503,825 | 13.5473 | 529,665 | 14.278 |
Lake | 18.4897 | 180,113 | 18.9001 | 308,353 | 20.3873 | 421,121 | 22.4377 | 475,057 | 23.7682 |
Baboon | 29.7421 | 129,521 | 29.8709 | 162,593 | 30.194 | 214,673 | 31.1826 | 276,049 | 32.8615 |
PROPOSED#1 | T = 5 | T = 10 | T = 15 | T = 20 | |||||
EC | EC | EC | EC | ||||||
Lena | 10.6977 | 347,489 | 11.3919 | 441,761 | 13.8218 | 472,465 | 15.1749 | 497,649 | 16.8222 |
Pepper | 12.2976 | 355,665 | 13.679 | 446,321 | 16.3835 | 478,129 | 17.8738 | 500,881 | 19.3211 |
Airplane | 8.5637 | 406,497 | 9.6877 | 462,929 | 11.2327 | 478,481 | 12.0022 | 493,025 | 13.0615 |
Lake | 17.0456 | 329,729 | 17.5542 | 389,841 | 19.1579 | 419,105 | 20.4192 | 449,425 | 22.1857 |
Baboon | 26.1272 | 302,065 | 26.3071 | 331,313 | 27.4723 | 351,073 | 28.6118 | 377,009 | 30.574 |
PROPOSED#2 | T = 5 | T = 10 | T = 15 | T = 20 | |||||
EC | EC | EC | EC | ||||||
Lena | 10.6977 | 399,585 | 12.2793 | 589,025 | 17.0417 | 649,889 | 19.5795 | 698,785 | 22.3666 |
Pepper | 12.2976 | 416,193 | 14.9094 | 600,257 | 19.9398 | 659,201 | 22.1908 | 704,801 | 24.7835 |
Airplane | 8.5637 | 517,921 | 10.608 | 631,169 | 13.157 | 661,921 | 14.4979 | 691,585 | 16.2101 |
Lake | 17.0456 | 365,505 | 18.0093 | 484,577 | 20.953 | 542,145 | 23.1115 | 602,465 | 25.9195 |
Baboon | 26.1272 | 308,257 | 26.5225 | 365,057 | 28.6964 | 404,353 | 30.6984 | 457,153 | 34.1375 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, C.; Shin, D.; Yang, C.; Leng, L. Data Hiding Method for Color AMBTC Compressed Images Using Color Difference. Appl. Sci. 2021, 11, 3418. https://doi.org/10.3390/app11083418
Kim C, Shin D, Yang C, Leng L. Data Hiding Method for Color AMBTC Compressed Images Using Color Difference. Applied Sciences. 2021; 11(8):3418. https://doi.org/10.3390/app11083418
Chicago/Turabian StyleKim, Cheonshik, Dongkyoo Shin, Chingnung Yang, and Lu Leng. 2021. "Data Hiding Method for Color AMBTC Compressed Images Using Color Difference" Applied Sciences 11, no. 8: 3418. https://doi.org/10.3390/app11083418
APA StyleKim, C., Shin, D., Yang, C., & Leng, L. (2021). Data Hiding Method for Color AMBTC Compressed Images Using Color Difference. Applied Sciences, 11(8), 3418. https://doi.org/10.3390/app11083418