Article
Version 1
Preserved in Portico This version is not peer-reviewed
Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code
Version 1
: Received: 3 July 2020 / Approved: 5 July 2020 / Online: 5 July 2020 (11:31:43 CEST)
A peer-reviewed article of this Preprint also exists.
Kim, C.; Shin, D.; Yang, C.-N.; Leng, L. Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code. Appl. Sci. 2020, 10, 5336. Kim, C.; Shin, D.; Yang, C.-N.; Leng, L. Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code. Appl. Sci. 2020, 10, 5336.
Abstract
We present a method of effectively concealing data in two quantization levels representing blocks based on Absolute Moment Block Truncation Coding (AMBTC) using Hamming code. The reason for choosing AMBTC as the cover media is that AMBTC is not only easily compressible by simple arithmetic operations, but is also efficient for exchanging data in small portable terminals, such as smart devices, because compression efficiency and image quality are satisfactory. AMBTC is expressed in the form of a $trio (a, b, BM)$, where $a$ and $b$ are quantization levels and BM is a bitmap. The quantization level is a pixel value used as a representative value when dividing an image into $4 \times 4$ blocks. Bai \& Chang introduced a method of hiding data using Hamming code.
However, this method presented a problem with efficiency compared to the existing methods.
In this paper, in order to improve the problem of this method, we minimize the error that occurs when concealing the data using the optimized Hamming code lookup table.
We verified that the performance of the proposed method is satisfactory in terms of embedding capacity and quality of the image through sufficient experimental results.
Keywords
Data Hiding; AMBTC; BTC; Hamming code; LSB
Subject
Engineering, Electrical and Electronic Engineering
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment