ArticlePDF Available

A systematic survey on block truncation coding based data hiding techniques

Authors:

Abstract and Figures

Block truncation coding is one of the simplest encoding methods which require insignificant computing cost to compress images. Due to the vast demand on embedding data into compressed images with low computing cost, a number of data hiding methods to improve block truncation coding have been proposed to be suitable for the low power devices such as IoT devices, field-programmable gate array, and portable image signal processor. In this paper, block truncation coding based data hiding methods will be discussed and analyzed on two key metrics - data hiding capacity and image quality - as many researchers are focusing to increase the image quality along with data hiding capacity. Here, our aim is to provide guidance to interested researchers for their future works in the field of block truncation coding based data hiding techniques. Finally, future directions of research with some suggestions will be discussed.
Content may be subject to copyright.
A preview of the PDF is not available
... As computer technology and the Internet continue to rapidly progress, the significance of network data security has become increasingly prominent. The technology of data hiding (DH) [1][2][3][4][5][6][7][8], which has undergone significant advancements in recent years, allows for embedding the protected data into a public carrier, such as an image, by leveraging the inherent redundancy of the image and the insensitivity of the Human Visual System (HVS). This concealed data remains imperceptible to individuals, making it an effective method for safeguarding the rights and interests of data owners. ...
... For a cover image X, where the current pixel is denoted as x(i, j) , and the predicted value px(i, j) is computed utilizing the equation provided below as Eq. (1). In this equation, the Content courtesy of Springer Nature, terms of use apply. ...
Article
Full-text available
As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible data hiding in encrypted images (RDHEI) is an effective method for enhancing the protection of personal privacy. To improve the embedding capacity, this paper introduces a novel scheme for RDHEI using block-based bit-plane reallocation. First, an effective optimized prediction method is utilized to predict the value of each pixel, followed by the calculation of prediction errors (PEs). Then, block-based bit-planes of PEs are extracted, and ten different bit-plane types are categorized to facilitate bit-plane reallocation, thereby freeing up redundant space. Finally, an adaptive encryption procedure is employed to encrypt the reallocated bit-plane, excluding the flag-bits. Experimental results demonstrate that the proposed scheme achieves average embedding rates (ER) of 3.584 bpp, 3.501 bpp, and 2.985 bpp on the three experimental datasets, all of which are higher than those of other state-of-the-art RDHEI schemes while ensuring both reversibility and security.
... The frequency domainbased data hiding techniques first transforms the original image into frequency coefficients, and then the secret data is embedded into the transformed frequency coefficients. Transformations that are commonly used include discrete cosine transform (DCT), discrete wavelet transform (DWT) and singular value decomposition (SVD) [55][56].This paper will use LSB and SVD as data hiding techniques in the proposed vision of securing 6G. ...
Preprint
Full-text available
Deep learning, machine learning and artificial intelligence have been proposed for enhancing the multimedia processing and security as well as the advanced security tools for 6G networks. The vision of 6G networks refers to linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data over the network. The data hiding based on the deep learning is considered compared to the traditional steganography tools in 6G network, it requires robust and flexible/combined multi- levels of security. This paper presents the proposed vision of 6G security. This paper focuses on security levels on 6G network. The paper proposes a multi-level security system that secures the data without affecting it. The multi-level security system consists of three security levels, which are two encryption techniques and a data hiding technique. The paper carried out several simulation experiments using multi dataset (Mathwork, Yolov8 and others) to evaluate the proposed scenarios and find integration of these techniques that provides the best security performance without affecting the data. The best simulation experiments that provided the best data security performance were the integration between 2D Logistic map, SVD, and Baker Map, respectively. The proposed steganography performs better than the recent published related works and compared with the deep learning based steganography. The proposed combined system provided the better simulation results for image security. The simulation results indicated a perfect match between the original message and the decryption original message after applying the system. The results also indicated that there was no effect on the data and no loss of data.
... Steganography hides secret data in a public file to prevent visual detection.Steganography is technique of encrypting messages into other media assets [55].Steganography can be divided into two types: spatial-domain and frequency-domain. The spatial domain-based data hiding techniques embed the secret data by modifying the pixel values directly using the techniques least significant bit (LSB) and most significant bit (MSB).The frequency domain-based data hiding techniques first transforms the original image intofrequency coefficients, and then the secret data is embedded into the transformed frequencycoefficients.Transformations that arecommonly used include discrete cosine transform (DCT), discrete wavelet transform(DWT) and singular value decomposition (SVD) [56][57].This paper will use LSB and SVD as data hiding techniques in the proposed vision of securing 6G. ...
Preprint
Full-text available
The vision of 6G networks refers to linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data over the network. 6G network requires very high levels of security. This paper presents the proposed vision of 6G security. This paper focuses on security levels on 6G network. The paper proposes a multi-level security system that secures the data without affecting it. The multi-level security system consists of three security levels, which are two encryption techniques and a data hiding technique. The paper carried outmany simulation experiments to find the best integration of these techniques that provides the best security performance without affecting the data. The best simulation experiments that provided the best data security performance were the integration between 2D Logistic map, SVD, and Baker Map, respectively. This system provided the best simulation results for data security. The simulation results indicated a perfect match between the original message and the decryption original message after applying the system. The results also indicated that there was no effect on the data and no loss of data.
... II. RELATED WORKS Kumar et al. [1] indexed out various literatures on BTC algorithms and the packages. This survey helped to apprehend the implementation techniques of BTC algorithm for compressing the images in multimedia database machine. ...
Article
Full-text available
Internet Learning Image compression is a useful approach this is inevitable to save any snapshots in compressed sample. The compressed image is reconstructed the usage of image retrieval system for any applications. This method guarantees garage performance in various content management packages. Mainly, Internet Learning resource environment deals with greater area complexity. The e-learning storage area complexity may be reduced with the assist of image compression strategies. There are extraordinary forms of image compression techniques invented for constructing compressed assets. Block Truncation Coding (BTC) is a kind of lossy compression technique for reducing grey scale quantities the usage of blocking and quantizing stages. This is powerful technique for compressing the photos. In the scope, the want for extra active and Generative image compression methods is important to enhance BTC principles. This work proposes notably complex and novel Generative Adversarial BTC (GA-BTC) compression models with more than one variances. GABTC is developed with multi-layered Deep Neural Network (DNN) structures with GA neural models. The integration of each GA fashions and BTC standards improve the best of block constructions and reconstructions notably. The proposed work evaluates the version complexity and efficiency using diverse Internet Learning images with exclusive compression fine measurements.
... This slight loss is almost invisible and hard to recognize, but all at the expense of the image's quality. In this technique, the compression rate is higher than the one in lossless compression, meaning the size of the image would be smaller, but this process can not be reversed; therefore, it is always recommended to have a backup of the original image, image formats that use lossy image compression are GIF, and JPEG [23,24]. ...
Article
Full-text available
Digital data compression aims to reduce the size of digital files in line with technological development. However, most data is distinguished by its large size, which requires a large storage capacity, and requires a long time in transmission operations via the Internet. Therefore, a new compress files method is needed to reduce the image size, maintain its quality, utilize storage spaces, and minimize time. This paper aims to improve digital image compression’s compression rates by dividing the image into several blocks. Thus, a new near-lossless method using the Huffman Coding technique is proposed. Digital image compression techniques are classified as lossless and lossy. Huffman Coding is a lossless-based technique used in the proposed method to maintain image quality during compression. The proposed method consists of several steps, which are dividing the image into blocks, finding the lowest value in each block and subtracting it from the rest of the values in the same block, then subtracting one from the odd numbers, dividing all the values on two, and finally applying the Huffman Coding technique to the block. The proposed method is applied to a well-known gray and color set with different types and different dimensions. Standard evaluation measures are used (i.e., PSNR, MSE, and CR) to evaluate the proposed method’s performance. When compressing images using the proposed method, the results demonstrated 0.11% enhancement when used two by two blocks. It also got high compression rates (25%).
... In addition, some BTC-based color image coding schemes had been developed by utilizing different strategies, such as the block prediction technique [13], the quadtree segmentation technique [4,20], and optimal single bit map generation [18]. Moreover, BTC had been applied to different multimedia applications such as audio coding [7], information hiding [1,2,21,22,24,25], image tamper detection [5,9,17,19,30]. ...
Article
Full-text available
An efficient grayscale image coding scheme based on block truncation coding (BTC) is proposed. The optimal pixel grouping mechanism and the multi-grouping division process are employed in the proposed scheme. An entropy-based indicator generation mechanism is employed to generate the block indicators of different groups. In addition, an optional bit rate reduction mechanism for dynamic block division is designed. Simulation results verify that significant image quality gain is acquired by the proposed scheme compared to the state-of-art image coding methods based on BTC. Meanwhile, a lower bit rate is consumed by the proposed scheme.
Article
Full-text available
This paper provides a comprehensive introduction to digital image, image compression and overview of E-learning. It presents the basic concepts and features of image compression techniques with different measuring qualities of image in the cloud environment for better storage space.
Article
Full-text available
Communication bandwidth plays a significant role in real-time communication. For this, absolute moment block truncation coding (AMBTC) has been popular. An AMBTC based high capacity multimedia data hiding method for covert communication is proposed in this paper. The proposed method applies AMBTC to the host image to get the compressed image in the form of AMBTC trios. The trios are then classified into three categories based on the difference between their quantization levels. The proposed method then adaptively conceals the secret message bits in the bitmaps of the trios based on their type. Additionally, the proposed method conceals two bits of secret data in every combination of quantization levels irrespective of their block types using the LSB substitution technique. The experimental results show that the proposed AMBTC based method is perform better to the other related data hiding based methods in terms of embedding capacity while providing comparable PSNR.
Article
Full-text available
In this paper, we propose a new enhanced absolute moment block truncation coding (AMBTC) image compression method based on interpolation. The proposed compression method takes the human visual system characteristics into the account using Weber’s law while compressing the image so that perceived image quality is maintained. Further, the low and high mean values of AMBTC trios are efficiently represented along with bit-plane so that number of bits representing the bit-plane can be reduced. As a result, the proposed method significantly reduces the number of bits to represent the compressed image without any visual image quality degradation.
Article
Full-text available
In this paper, we propose a new Absolute Moment Block Truncation Coding (AMBTC) based data hiding scheme using hamming distance and pixel value differencing methods. The proposed method firstly pre-processes the original image using a smoothing filter so that its quality can be maintained after AMBTC compression. It then applies AMBTC compression on the processed image and uses two thresholds to categorize the image blocks into three categories namely Smooth, Less_Complex, and Highly_Complex blocks so that the complex block can also be used to embed the secret data. The secret data is then embedded into the smooth blocks using simple replacement strategy. Further, the proposed method embeds 8 bits of secret data into the bit plane of Less_Complex blocks using hamming distance calculation and few bits into the quantization levels of Highly_Complex blocks using pixel value differencing (PVD) method to increase the data hiding capacity without having any major impact on image quality. Thus, the proposed method additionally embeds on average 6 more bits in complex blocks. Experimental results also prove that the proposed method is superior to the contemporary AMBTC based data hiding methods in term of data hiding capacity and has comparable image quality.
Article
Full-text available
In this paper, an optimized data embedding method based on Huang et al.’s work for absolute moment block truncation coding (AMBTC) is proposed. Huang et al.’s work successfully exploits the difference of quantization levels (QLs) for data embedment and has an excellent embedding performance. However, the modified QLs are not adjusted to minimize the distortion. In some rare cases, they might exceed the grayscale range. Moreover, the order of QLs in smooth blocks is not utilized for data embedment, losing the chance to embed one additional bit without deteriorating the image block. We propose a method to give analytical solutions to adjust QLs such that the distortions in both smooth and complex blocks are minimized. A subtle mechanism is also provided to ensure that no QLs will overflow or underflow. Moreover, the order of QLs is utilized in data embedment to further increase the payload without sacrificing the image quality. The experimental results reveal that the proposed method offers a better image quality over Huang et al.’s and other state-of-the-art works while providing a comparable or larger payload.
Article
Full-text available
With the current growth of multimedia applications, a substantial amount of visual data, including images and videos, is transmitted daily, making information forensics and security essential. Thus, protecting secret data from attackers is critical. In this work, we propose a AMBTC-based data-hiding method, in which secret data are concealed in individual image blocks that are compressed using absolute moment block truncation coding technique. By placing high or low mean values at the corner of each block, the secret data are then extracted reversibly and the original host image can be recovered at the decoding end. In addition, the quality of stego images is maintained, which protects the embedded visual data from the suspicion of attackers. From the experimental results, we show that the proposed method outperforms other state-of-the-art methods.
Article
Full-text available
This paper proposes a joint coding and reversible data hiding method for absolute moment block truncation coding (AMBTC) compressed images. Existing methods use a predictor to predict the quantization levels of AMBTC codes. Equal-length indicators, secret bits and prediction errors are concatenated to construct the output code stream. However, the quantization levels might not highly correlate with their neighbors for predictive coding, and the use of equal-length indicators might impede the coding efficiency. The proposed method uses reversible integer transform to represent the quantization levels by their means and differences, which is advantageous for predictive coding. Moreover, the prediction errors are better classified into symmetrical encoding cases using the adaptive classification technique. The length of indicators and the bits representing the prediction errors are properly assigned according to the classified results. Experiments show that the proposed method offers the lowest bitrate for a variety of images when compared with the existing state-of-the-art works.
Article
Full-text available
In this paper, an efficient data hiding method that embeds data into absolute moment block truncation coding (AMBTC) codes is proposed. The AMBTC method represents image blocks by trios, and each trio consists of two quantization levels and an asymmetrically distributed bitmap. However, the asymmetric phenomena of bitmaps cause large degradation in image quality during data embedment. With the help of reference tables filled with symmetrical patterns, the proposed method exploits a symmetry adjustment model to modify the quantization levels in those smooth blocks to achieve the smallest distortion. If the block is complex, a lossless embedding method is performed to carry one additional bit. A sophisticated division switching mechanism is also proposed to modify a block from smooth to complex if the solution to the minimal distortion cannot be found. The payload can be adjusted by varying the threshold, or by embedding more bits into the quantization levels. The experiments indicate that the proposed work provides the best stego image quality under various payloads when comparing to the related prior works.
Article
Full-text available
Image steganography is one of the most important research areas of information security where secret data is embedded in the images to conceal its existence while getting the minimum possible statistical detectability. To achieve a good tradeoff between the hiding capacity and image quality, more work needs to be further researched. In this paper, we propose high capacity data hiding scheme by employing the absolute moment block truncation coding (AMBTC) compression. It exploits the redundancy of blocks of the AMBTC-compressed image to embed the secret data. The pixel values of the AMBTC-compressed image are modified at most by one for hiding the secret data. Thus, it is able to maintain the stego-image quality after hiding the secret data. Experimental results validate the effectiveness of the proposed scheme and show that it outperforms various existing methods in terms of both hiding capacity and stego-image quality.
Article
A reserving room before encryption (RRBE) framework is proposed to provide separable reversible data hiding for encrypted images in this paper. A combination of Interpolative AMBTC and Huffman coding is used to enhance the hiding capacity. In our scheme, a receiver with only the hiding key can extract the secret data without knowing about the content. If the receiver has only the encryption key, it is not possible to extract the hidden secret data, but it is possible to decrypt an image similar to the original image. Only when the receiver has both the hiding key and the encryption key, it is possible to extract the secret data and completely recover the original content without any error. The experimental results demonstrated the efficiency of our proposed high payload reversible data hiding scheme for encrypted images (HP-RDHEI), especially with respect to the data embedding rate.
Article
Due to advancement in communication technology, data are transmitted over the network which is either confidential or private. So, the information security is one of the most critical factors considered when secret data is transmitted between two parties. Another important issue is the bandwidth utilisation for data transmission. Image steganography is a widely used technique for data hiding. It is used in critical applications like military and medical areas. Most of the work is done in uncompressed images, which leads to high storage and large bandwidth required for transmission. Keeping these two factors in mind, this paper presents the multilevel histogram shifting technique in the compressed domain with the addition of adaptive block division scheme to improve the embedding capacity as well as reduce the utilisation of the bandwidth. In this method, absolute moment block truncation coding (AMBTC) compression technique has been used for compression because of its good compression ratio.
Article
The data-hiding approach in the data compression domain has recently become of great interest. Secret data embedded in the compressed file would not be easily found and people would not suspect that there is something important hidden in the file. This paper presents a data-hiding approach that hides the secret data within a block truncation coding (BTC) image. Experimental results show that the proposed scheme can embed a large volume of secret data in the compressed file while maintaining satisfactory image quality.