Improved reversible data hiding scheme based on AMBTC compression technique

  • Shan Sun
  • , Zhaoxia Yin*
  • , Jin Tang
  • , Bin Luo
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

As the compression technique spread on the Internet, data hiding combining with compression techniques is a hot property in recent years. In this paper, a reversible data hiding (RDH) scheme for Absolute Moment Block Truncation Coding (AMBTC) compressed image is proposed. In the proposed scheme, according to the four kinds of situations which the secret data combine with the bitmap value, we provide some rules to embed data by use the mean value and the absolute moment. Experimental results and analysis demonstrate that, the proposed method can achieve high capacity with low distortion. Besides, the proposed method is very simple and can be easily applied to real-time transmission due to its lower computational complexity.

Original languageEnglish
Title of host publicationIndustrial IoT Technologies and Applications - 2nd EAI International Conference, Industrial IoT 2017, Proceedings
EditorsFulong Chen, Yonglong Luo
PublisherSpringer Verlag
Pages111-118
Number of pages8
ISBN (Print)9783319607528
DOIs
StatePublished - 2017
Externally publishedYes
Event2nd EAI International Conference on Industrial IoT Technologies and Applications, Industrial IoT 2017 - Wuhu, China
Duration: 25 Mar 201726 Mar 2017

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume202
ISSN (Print)1867-8211

Conference

Conference2nd EAI International Conference on Industrial IoT Technologies and Applications, Industrial IoT 2017
Country/TerritoryChina
CityWuhu
Period25/03/1726/03/17

Keywords

  • AMBTC
  • High capacity
  • Reversible data hiding

Fingerprint

Dive into the research topics of 'Improved reversible data hiding scheme based on AMBTC compression technique'. Together they form a unique fingerprint.

Cite this