{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:42:21Z","timestamp":1760146941185,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T00:00:00Z","timestamp":1735516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Education and Scientific Research Project of Fujian Province","award":["JAT210351"],"award-info":[{"award-number":["JAT210351"]}]},{"name":"2023 Xiamen Overseas Students Scientific Research Project","award":["169-1"],"award-info":[{"award-number":["169-1"]}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2023J011430, 2022J011234, 2022J011235"],"award-info":[{"award-number":["2023J011430, 2022J011234, 2022J011235"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>To reduce bandwidth usage in communications, absolute moment block truncation coding is employed to compress cover images. Confidential data are embedded into compressed images using reversible data-hiding technology for purposes such as image management, annotation, or authentication. As data size increases, enhancing embedding capacity becomes essential to accommodate larger volumes of secret data without compromising image quality or reversibility. Instead of using conventional absolute moment block truncation coding to encode each image block, this work proposes an effective reversible data-hiding scheme that enhances the embedding results by utilizing the traditional set of values: a bitmap, a high value, and a low value. In addition to the traditional set of values, a value is calculated using arithmetical differential coding and may be used for embedding. A process involving joint neighborhood coding and logical differential coding is applied to conceal the secret data in two of the three value tables, depending on the embedding capacity evaluation. An indicator is recorded to specify which two values are involved in the embedding process. The embedded secret data can be correctly extracted using a corresponding two-stage extraction process based on the indicator. To defeat the state-of-the-art scheme, bitmaps are also used as carriers in our scheme yet are compacted even more with Huffman coding. To reconstruct the original image, the low and high values of each block are reconstructed after data extraction. Experimental results show that our proposed scheme typically achieves an embedding rate exceeding 30%, surpassing the latest research by more than 2%. Our scheme reaches outstanding embedding rates while allowing the image to be perfectly restored to its original absolute moment block truncation coding form.<\/jats:p>","DOI":"10.3390\/cryptography9010004","type":"journal-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T13:26:25Z","timestamp":1735651585000},"page":"4","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding"],"prefix":"10.3390","volume":"9","author":[{"given":"Ching-Chun","family":"Chang","sequence":"first","affiliation":[{"name":"Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4552-336X","authenticated-orcid":false,"given":"Yijie","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3401-8742","authenticated-orcid":false,"given":"Jui-Chuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","article-title":"Reversible watermark using the difference expansion of a generalized integer transform","volume":"13","author":"Alattar","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"doi-asserted-by":"crossref","unstructured":"Wu, H. (2021). Recent advances in reversible watermarking in an encrypted domain. Advanced Security Solutions for Multimedia, IOP Publishing.","key":"ref_5","DOI":"10.1088\/978-0-7503-3735-9ch4"},{"doi-asserted-by":"crossref","unstructured":"Jiang, X., Xie, Y., Zhang, Y., Ye, Y., Xu, F., Li, L., Su, Y., and Chen, Z. (2024). Reversible Data Hiding in Encrypted Images Using Reservoir Computing Based Data Fusion Strategy. IEEE Trans. Circuits Syst. Video Technol.","key":"ref_6","DOI":"10.1109\/TCSVT.2024.3459024"},{"doi-asserted-by":"crossref","unstructured":"Gao, G., Yang, S., Hu, X., Xia, Z., and Shi, Y.Q. (2024). Reversible data hiding-based local contrast enhancement with nonuniform superpixel blocks for medical images. IEEE Trans. Circuits Syst. Video Technol.","key":"ref_7","DOI":"10.1109\/TCSVT.2024.3482556"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","article-title":"An algorithm for vector quantizer design","volume":"28","author":"Linde","year":"1980","journal-title":"IEEE Trans. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1080\/13682199.2022.2141873","article-title":"An image compression model via adaptive vector quantization: Hybrid optimization algorithm","volume":"68","author":"Chavan","year":"2020","journal-title":"Imaging Sci. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.ins.2020.10.033","article-title":"The F-transform preprocessing for JPEG strong compression of high-resolution images","volume":"550","author":"Perfilieva","year":"2021","journal-title":"Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Hamano, G., Imaizumi, S., and Kiya, H. (2023). Effects of jpeg compression on vision transformer image classification for encryption-then-compression images. Sensors, 23.","key":"ref_11","DOI":"10.3390\/s23073400"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","article-title":"Image compression using block truncation coding","volume":"27","author":"Delp","year":"1979","journal-title":"IEEE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"Yang, C.N., Chou, Y.C., Chang, T.K., and Kim, C. (2020). An enhanced adaptive block truncation coding with edge quantization scheme. Appl. Sci., 10.","key":"ref_13","DOI":"10.3390\/app10207340"},{"doi-asserted-by":"crossref","unstructured":"Lin, Y., Lin, C.C., Chang, C.C., and Chang, C.C. (2024). An IoT-Based Electronic Health Protection Mechanism With AMBTC Compressed Images. IEEE Internet Things J.","key":"ref_14","DOI":"10.1109\/JIOT.2024.3467152"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","article-title":"Absolute moment block truncation coding and its application to color images","volume":"32","author":"Lema","year":"1984","journal-title":"IEEE Trans. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","article-title":"High payload image steganography with minimum distortion based on absolute moment block truncation coding","volume":"74","author":"Ou","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","article-title":"A novel reversible data hiding scheme based on AMBTC compression technique","volume":"74","author":"Lin","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"6159","DOI":"10.1007\/s11042-015-3208-y","article-title":"Hybrid secret hiding schemes based on absolute moment block truncation coding","volume":"76","author":"Huang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"9039","DOI":"10.1007\/s11042-017-4800-0","article-title":"A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator","volume":"77","author":"Chang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_20","first-page":"94","article-title":"Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing","volume":"47","author":"Kumar","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"129347","DOI":"10.1109\/ACCESS.2020.3009232","article-title":"Steganography using quotient value differencing and LSB substitution for AMBTC compressed images","volume":"8","author":"Horng","year":"2020","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","article-title":"High performance reversible data hiding for block truncation coding compressed images","volume":"7","author":"Sun","year":"2013","journal-title":"Signal Image Video Process."},{"doi-asserted-by":"crossref","unstructured":"Liu, J.C., Lin, Y., Chang, C.C., and Chang, C.C. (2024). A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility. Multimed. Tools Appl., 1\u201323.","key":"ref_23","DOI":"10.1007\/s11042-024-19752-1"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","article-title":"A steganographic method for images by pixel-value differencing","volume":"24","author":"Wu","year":"2003","journal-title":"Pattern Recognit. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.sigpro.2014.09.036","article-title":"High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding","volume":"108","author":"Chang","year":"2015","journal-title":"Signal Process."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/4\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:57:21Z","timestamp":1760115441000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,30]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["cryptography9010004"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9010004","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2024,12,30]]}}}