Abstract
Hiding secret data in digital images is an attractive topic in the information security research area. Because the data-embedded stego image looks exactly the same as a regular image, transmitting secret data with stego images does not draw the attention of eavesdroppers, thus fulfilling the goal of information security. Many reversible data hiding (RDH) methods for absolute moment block truncation coding (AMBTC) compressed images have been proposed. These methods hide secret data in an AMBTC-compressed image to produce a stego image and transmit it to the recipient. Upon receiving the stego image, the recipient can extract the secret data and recover the AMBTC-compressed image. In this paper, we propose an RDH scheme for AMBTC-compressed images with an asymmetric embedding rule. Using the AMBTC-compressed version as the basis, the proposed embedding scheme always modifies a pixel value toward its original value with a step size (bitrate) proportional to the gap width. Therefore, the visual quality of the stego image is better than the referred AMBTC version. Additionally, as a result of the adaptive bitrate strategy, the data embedding capacity of the proposed scheme outperforms that of state-of-the-art methods. The security of the resulting stego images was also tested by RS-steganalysis. Experimental results show that the overall performance of the proposed scheme is satisfactory. We revised it, please confirm.
Highlights
We focus on the reversible data hiding (RDH) method based on absolute moment block truncation coding (AMBTC) reconstructed images [31,32,33]; that is, the secret data is embedded by modifying the pixel values of the AMBTC reconstructed image to produce the stego image
The security of our scheme under steganalysis is with state-of-the-art methods
Another commonly applied steganalysis technique is the pixel value differencing histogram (PDH) analysis proposed by Zhang and Wang [46], which is applied to detect the pixel value differencing (PVD)-based data hiding
Summary
Regarding traditional encryption methods such as the RSA cryptosystem, they can provide a high security level, the encrypted codes may draw the attention of eavesdroppers. To overcome this drawback, data hiding methods have been devoted to hide secret data in ordinary media without changing their original contents [1]. The cover media include images, audio, and videos, among which images are the most often implemented. After embedding secret data into a cover image, the data-embedded image is called a stego image. A data hiding method is reversible when the cover image can be restored after the secret data is extracted from the stego image [2]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.