Submitted:
13 April 2023
Posted:
14 April 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related works
2.1. Absolute Moment Block Truncation Coding (AMBTC)
2.2. The Combination Theory
| Algorithm 1 Confidential Data Calculation |
| FOR p = 1 : u ; q = 1 : v |
| IF P’x,y hasSr |
| T(Sr) = T(Sr) +1 |
| END |
| END |
| Algorithm 2 Confidential Data Embedding |
| FOR p = 1 : u ; q = 1 : v |
| IF Px,y= S’’ |
| IF Gi (p,q) = 1 |
| Gi (p,q) = 0 |
| ELSE |
| Gi (p,q) = 1 |
| END |
| END |
| END |
3. The Proposed Method
3.1. The Embedding Procedures



3.2. The Extraction Procedures
| Algorithm 3 Confidential Data Calculation |
| FOR p = 1 : u ; q = 1 : v |
| IF P’x,y hasSr |
| T(Sr) = T(Sr) +1 |
| END |
| END |
4. Experimental Results
- The capacity of our scheme is between thresholds (TH 5 & TH10) of Lee et al.'s scheme [17].
- If the picture is complex (non-smooth), the capacity of our proposed method is more excellent than Lee et al.'s scheme [17].
- The qualification of images (PSNR) is higher than Lee et al.'s scheme [17]. Moreover, our proposed method performs satisfying image quality in complex images.

5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- M. Alhomoud, “Image steganography in spatial domain: Current status, techniques, and trends,” Intell. Autom. Soft Comput., vol. 27, no. 1, pp. 69–88, 2021. [CrossRef]
- N. Min-allah et al., “Quantum Image Steganography Schemes for Data Hiding : A Survey,” Appl. Sci., vol. 12, no. 10294, 2022. [CrossRef]
- K. Anggriani, N. Wu, and M. Hwang, “Research on Coverless Image Steganography,” Int. J. Netw. Secur., vol. 25, no. 1, pp. 25–31, 2023. [CrossRef]
- Dorobant and R. Brad, “Improving Lossless Image Compression with Contextual Memory,” Appl. Sci., vol. 9, no. 2681, 2019. [CrossRef]
- S. Q. Saleh, “Digital Image Steganalysis : Current Methodologies and Future Challenges,” IEEE Access, vol. 10, no. August, pp. 92321–92336, 2022. [CrossRef]
- Y. Linde, “An Algorithm for Vector Quantizer Design,” IEEE Trans. Commun., vol. 28, no. 1, pp. 84–95, 1980. [CrossRef]
- K. Chiranjeevi and U. R. Jena, “Image compression based on vector quantization using cuckoo search optimization technique,” Ain Shams Eng. J., vol. 9, no. 4, pp. 1417–1431, 2018. [CrossRef]
- P. P. Chavan, B. S. Rani, M. Murugan, and P. Chavan, “An image compression model via adaptive vector quantization: hybrid optimization algorithm,” Imaging Sci. J., vol. 68, no. 5–8, pp. 259–277, 2020. [CrossRef]
- E. Robert, O. Mitchell, J. Delp, “Image Compression Using Block Truncation Coding,” IEEE Trans. Commun., vol. 27, no. 9, pp. 1335–1341, 1979.
- K. Somasundaram, “Efficient Block Truncation Coding,” Int. J. Comput. Sci. Eng., vol. 2, no. 6, pp. 2163–2166, 2010.
- E. Q. Scheme, “An Enhanced Adaptive Block Truncation Coding with,” Appl. Sci., vol. 10, no. 7340, pp. 1–15, 2019. [CrossRef]
- K. Sau, R. Kumar, and A. Chanda, “Image Compression based on Block Truncation Coding using Clifford Algebra,” Procedia Technol., vol. 10, pp. 699–706, 2013. [CrossRef]
- M. D. Lema and R. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Trans. Commun., vol. 32, no. 10, 1984.
- Perfilieva and P. Hurtik, “The F-transform preprocessing for JPEG strong compression of high-resolution images,” Inf. Sci. (Ny)., vol. 550, pp. 221–238, 2021. [CrossRef]
- L. Mancini, G. Kourousias, A. Velez, J. F. Barrera, K. Bredies, and M. Holler, “Developed JPEG Algorithm Applied in Image Compression Developed JPEG Compression Algorithm Applied in Image,” in 2nd International Scientific Conference of Al-Ayen University (ISCAU-2020), 2020, pp. 1–17. [CrossRef]
- G. Hamano and S. Imaizumi, “Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images,” sensors, vol. 23, no. 3400, pp. 1–19, 2023. [CrossRef]
- C.-F. Lee, C.-C. Chang, and G. Li, “A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images,” KSII Trans. Internet Inf. Syst., vol. 14, no. 6, pp. 2554–2575, 2020. [CrossRef]
- Kim, “Separable Reversible Data Hiding in Encrypted AMBTC Images Using Hamming Code,” Appl. Sci., vol. 12, no. 8225, 2022. [CrossRef]
- Kim, D. Shin, and C. Yang, “Data Hiding Method for Color AMBTC Compressed Images Using Color Difference,” Appl. Sci., vol. 11, no. 3418, 2021. [CrossRef]
- Kim, “Dual Reversible Data Hiding Based on AMBTC Using Hamming Code and LSB Replacement,” Electronics, vol. 11, no. 3210, 2022. [CrossRef]
- C. Lin, J. Lin, and C. Chang, “Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding,” Electronics, vol. 10, no. 281, 2021. [CrossRef]
- Anggriani, N. Wu, and M. Hwang, “Research on Data Hiding Schemes for AMBTC Compressed Images,” Int. J. Netw. Secur., vol. 24, no. 6, pp. 1114–1123, 2022. [CrossRef]
- Y. Chen, C. Chang, C. Lin, and Z. Wang, “An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference,” Appl. Sci., vol. 11, no. 635, 2021. [CrossRef]
- Anggriani, S. Chiou, N. Wu, and M. Hwang, “A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments,” Electronics, vol. 12, no. 395, 2023. [CrossRef]
- N. Wu and M. Hwang, “Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images,” Displays, vol. 49, pp. 116–123, 2017. [CrossRef]




| Image | Metrics | Lee et al Scheme [17] | Proposed | ||||||
|---|---|---|---|---|---|---|---|---|---|
| TH 50 | TH 40 | TH 30 | TH 20 | TH 10 | TH 5 | TH 0 | |||
| Airplane | PSNR | 33.89 | 33.86 | 33.86 | 33.90 | 33.87 | 33.83 | 33.86 | 38.25 |
| MSE | 26.53 | 26.72 | 26.70 | 26.49 | 26.64 | 26.93 | 26.72 | 9.72 | |
| Capacity | 319808 | 311984 | 301424 | 285968 | 250432 | 188800 | 81920 | 195928 | |
| Baboon | PSNR | 30.87 | 30.82 | 30.82 | 30.84 | 30.85 | 30.83 | 30.85 | 37.97 |
| MSE | 53.17 | 53.80 | 53.86 | 53.60 | 53.41 | 53.76 | 53.41 | 10.36 | |
| Capacity | 281136 | 249920 | 216304 | 179504 | 128112 | 97424 | 81920 | 104284 | |
| Barbara | PSNR | 31.94 | 31.93 | 31.95 | 31.94 | 31.93 | 31.99 | 31.97 | 37.59 |
| MSE | 41.61 | 41.70 | 41.48 | 41.62 | 41.66 | 41.14 | 41.27 | 11.31 | |
| Capacity | 302544 | 285584 | 263808 | 232496 | 190128 | 131440 | 81920 | 151840 | |
| Boat | PSNR | 31.73 | 31.71 | 31.70 | 31.70 | 31.77 | 31.72 | 31.74 | 36.27 |
| MSE | 43.63 | 43.84 | 43.90 | 43.90 | 43.21 | 43.67 | 43.52 | 15.34 | |
| Capacity | 321520 | 311568 | 297024 | 269280 | 191600 | 113200 | 81920 | 158440 | |
| Lena | PSNR | 33.43 | 33.43 | 33.40 | 33.422 | 55.47 | 33.38 | 33.42 | 37.42 |
| MSE | 29.51 | 29.50 | 29.66 | 29.56 | 18.43 | 29.80 | 29.58 | 11.76 | |
| Capacity | 335680 | 329152 | 318032 | 298880 | 254976 | 175248 | 81920 | 201364 | |
| Pepper | PSNR | 32.68 | 32.73 | 32.68 | 32.65 | 32.70 | 32.68 | 32.69 | 35.89 |
| MSE | 35.00 | 34.66 | 35.019 | 35.29 | 34.86 | 35.01 | 34.96 | 16.72 | |
| Capacity | 329536 | 324208 | 315904 | 300720 | 242848 | 135440 | 81920 | 197632 | |
| Average | PSNR | 32.38 | 32.36 | 32.36 | 32.38 | 32.37 | 32.39 | 32.38 | 37.24 |
| MSE | 38.60 | 38.71 | 38.69 | 38.55 | 38.63 | 38.50 | 38.59 | 12.54 | |
| Capacity | 314664 | 301671 | 285226 | 260980 | 209447 | 140108 | 86993 | 168248 | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).