Browse > Article
http://dx.doi.org/10.3837/tiis.2016.06.020

Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting  

Hong, Wien (School of Computer and Software Nanjing University of Information Science and Technology)
Zheng, Shuozhen (Department of Electronic Communication and Software Engineering Nanfang College of Sun Yat-Sen University)
Chen, Tung-Shou (National Taichung University of Science and Technology Department of Computer Science and Information Engineering)
Huang, Chien-Che (National Taichung University of Science and Technology Department of Computer Science and Information Engineering)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.6, 2016 , pp. 2817-2834 More about this Journal
Abstract
The existing reversible data hiding methods for block truncation coding (BTC) compressed images often utilize difference expansion or histogram shifting technique for data embedment. Although these methods effectively embed data into the compressed codes, the embedding operations may swap the numerical order of the higher and lower quantization levels. Since the numerical order of these two quantization levels can be exploited to carry additional data without destroying the quality of decoded image, the existing methods cannot take the advantages of this property to embed data more efficiently. In this paper, we embed data by shifting the higher and lower quantization levels in opposite direction. Because the embedment does not change numerical order of quantization levels, we exploit this property to carry additional data without further reducing the image quality. The proposed method performs no-distortion embedding if the payload is small, and performs reversible data embedding for large payload. The experimental results show that the proposed method offers better embedding performance over prior works in terms of payload and image quality.
Keywords
BTC; Difference expansion; Histogram shifting; Quantization levels;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015. Article (CrossRef Link)   DOI
2 Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 2016. Article (CrossRef Link)   DOI
3 Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual Verifiable Provable Data Auditing in Public Cloud Storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015. Article (CrossRef Link)   DOI
4 P. Guo, J. Wang, B. Li, and S. Lee, “A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks,” Journal of Internet Technology, vol. 15, no. 6, pp. 929-936, 2014. Article (CrossRef Link)
5 J. Li, X. Li, B. Yang and X. Sun, “Segmentation-based Image Copy-move Forgery Detection Scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, 2015. Article (CrossRef Link)   DOI
6 B. Chen, H. Shu, G. Coatrieux, G. Chen, X. Sun, and J.L. Coatrieux, “Color Image Analysis by Quaternion-Type Moments,” Journal of Mathematical Imaging and Vision, vol. 51, no. 1, pp. 124-144, 2015. Article (CrossRef Link)   DOI
7 Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB Matching Using Differences Between Nonadjacent Pixels,” Multimedia Tools and Applications, vol. 75, no. 4, pp. 1947-1962, 2016. Article (CrossRef Link)   DOI
8 Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of Least Significant Bit Matching Using Multi-Order Differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283-1291, 2014. Article (CrossRef Link)   DOI
9 B.Gu, V.S. Sheng, K.Y. Tay, W. Romano, and S. Li, “Incremental Support Vector Learning for Ordinal Regression,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1403-1416, 2015. Article (CrossRef Link)   DOI
10 B. Gu, V. S. Sheng, Z. Wang, D. Ho, S. Osman, and S. Li, "Incremental Learning for ν-Support Vector Regression," Neural Networks, vol. 67, pp. 140-150, 2015. Article (CrossRef Link)   DOI
11 X. Wen, L. Shao, Y. Xue, and W. Fang, “A Rapid Learning Algorithm for Vehicle Classification,” Information Sciences, vol. 295, no. 1, pp. 395-406, 2015. Article (CrossRef Link)   DOI
12 Z. Yuhui, J. Byeungwoo, X. Danhua, W.Q.M. Jonathan and Z. Hui, “Image Segmentation by Generalized Hierarchical Fuzzy C-means Algorithm,” Journal of Intelligent and Fuzzy Systems, vol. 28, no. 2, pp. 961-973, 2015. Article (CrossRef Link)
13 J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006. Article (CrossRef Link)   DOI
14 W. Hong and T.S. Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 176-184, 2012. Article (CrossRef Link)   DOI
15 Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. Article (CrossRef Link)   DOI
16 X.L. Li, J. Li, B. Li, and B. Yang, “High-Fidelity Reversible Data Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion,” Signal Processing, vol.93, no. 1, pp. 198-205, 2013. Article (CrossRef Link)   DOI
17 X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images,” Signal Processing, vol. 90, no. 12, pp. 3026-3036, 2010. Article (CrossRef Link)   DOI
18 X. Wang, J. Ding, and Q.Q. Pei, “A Novel Reversible Image Data Hiding Scheme Based on Pixel Value Ordering and Dynamic Pixel Block Partition,” Information Science, vol. 310, pp. 16-35, 2015. Article (CrossRef Link)   DOI
19 W. Hong, T.S. Chen, and J. Chen, “Reversible Data Hiding Using Delaunay Triangulation and Selective Embedment,” Information Sciences, vol. 308, pp. 140-154, 2015. Article (CrossRef Link)   DOI
20 W.J. Wang, C.T. Huang, C.M. Liu, P.C. Su, and S.J. Wang, “Data Embedding for Vector Quantization Image Processing on the Basis of Adjoining State-Codebook Mapping,” Information Sciences, vol. 246, pp. 69-82, 2013. Article (CrossRef Link)   DOI
21 W. Hong, T.S. Chen, C.W. Shiu, and M.C. Wu, “Lossless Data Embedding in BTC Codes Based on Prediction and Histogram Shifting,” Applied Mechanics and Materials, vol. 65, pp. 182-185, 2011. Article (CrossRef Link)   DOI
22 J. Chen, W. Hong, T.S. Chen and C.W. Shiu, “Steganography for BTC Compressed Images Using No Distortion Technique,” Image Science Journal, vol. 58, no. 4, pp. 177-185. 2010. Article (CrossRef Link)   DOI
23 C.C. Chang, C.Y. Lin, and Y.H. Fan, “Reversible Steganography for BTC-Compressed Images,” Fundamenta Informaticae, vol. 109, no. 2, pp. 121-134, 2011. Article (CrossRef Link)
24 C.C. Lo, Y.C. Hu, W.L. Chen, and C.M. Wu, “Reversible Data Hiding Scheme for BTC-Compressed Images Based on Histogram Shifting,” International Journal of Security and Its Applications, vol. 8, no. 2, pp. 301-314, 2014. Article (CrossRef Link)   DOI
25 The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/
26 Y.Y. Tsai, C.S. Chan, C.L. Liu, and B.R Su, “A Reversible Steganographic Algorithm for BTC-Compressed Images Based on Difference Expansion and Median Edge Detector,” Imaging Science Journal, vol. 62, no. 1, pp. 48-55, 2014. Article (CrossRef Link)   DOI
27 M.D. Lema and O.R. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Transactions on Communication, vol. 32, no. 10, pp. 1148-1157, 1984. Article (CrossRef Link)   DOI