{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T21:02:54Z","timestamp":1762808574360,"version":"build-2065373602"},"reference-count":36,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T00:00:00Z","timestamp":1516838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In this paper, an efficient data hiding method that embeds data into absolute moment block truncation coding (AMBTC) codes is proposed. The AMBTC method represents image blocks by trios, and each trio consists of two quantization levels and an asymmetrically distributed bitmap. However, the asymmetric phenomena of bitmaps cause large degradation in image quality during data embedment. With the help of reference tables filled with symmetrical patterns, the proposed method exploits a symmetry adjustment model to modify the quantization levels in those smooth blocks to achieve the smallest distortion. If the block is complex, a lossless embedding method is performed to carry one additional bit. A sophisticated division switching mechanism is also proposed to modify a block from smooth to complex if the solution to the minimal distortion cannot be found. The payload can be adjusted by varying the threshold, or by embedding more bits into the quantization levels. The experiments indicate that the proposed work provides the best stego image quality under various payloads when comparing to the related prior works.<\/jats:p>","DOI":"10.3390\/sym10020036","type":"journal-article","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T12:25:49Z","timestamp":1516883149000},"page":"36","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Efficient Data Hiding Based on Block Truncation Coding Using Pixel Pair Matching Technique"],"prefix":"10.3390","volume":"10","author":[{"given":"Wien","family":"Hong","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, Nanfang College of Sun Yat-Sen University, Guangzhou 510970, China"},{"name":"School of Computer & Software, Nanjing University of Information Science & Technology, Nanjing 210044, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,1,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/2566590.2566610","article-title":"Trends in steganography","volume":"57","author":"Mazurczyk","year":"2014","journal-title":"Commun. ACM"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","article-title":"Reversible data hiding using delaunay triangulation and selective embedment","volume":"308","author":"Hong","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","article-title":"Steganalysis of LSB matching using differences between nonadjacent pixels","volume":"75","author":"Xia","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","article-title":"Random projections of residuals for digital image steganalysis","volume":"8","author":"Holub","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","article-title":"Low-complexity features for JPEG steganalysis using undecimated DCT","volume":"10","author":"Holub","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","article-title":"Data embedding in digital images using critical functions","volume":"58","author":"Liao","year":"2017","journal-title":"Signal Process. Image Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","article-title":"A novel data embedding method using adaptive pixel pair matching","volume":"7","author":"Hong","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","article-title":"CISSKA-LSB: Color image steganography using stego key-directed adaptive LSB substitution method","volume":"76","author":"Muhammad","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Liao, X., Guo, S., Yin, J., Wang, H., Li, X., and Sangaiah, A.K. (2017). New cubic reference table based image steganography. Multimed. Tools Appl.","DOI":"10.1007\/s11042-017-4946-9"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.ins.2016.12.049","article-title":"A novel message embedding algorithm using the optimal weighted modulus","volume":"388\u2013389","author":"Chen","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Filler, T., and Bas, P. (2010, January 28\u201330). Using high-dimensional image models to perform highly undetectable steganography. Proceedings of the 12th International Workshop on Information Hiding, Calgary, AB, Canada. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Holub, V., and Fridrich, J. (2012, January 2\u20135). Designing steganographic distortion using directional filters. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain.","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J., and Denemark, T. (2014). Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur.","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Holub, V., and Fridrich, J. (2013, January 17\u201319). Digital image steganography using universal distortion. Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France.","DOI":"10.1145\/2482513.2482514"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5441","DOI":"10.1007\/s11042-016-4032-8","article-title":"An efficient reversible data hiding method for AMBTC compressed images","volume":"76","author":"Hong","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.image.2017.07.001","article-title":"An efficient reversible image authentication method using improved PVO and LSB substitution techniques","volume":"58","author":"Hong","year":"2017","journal-title":"Signal Process. Image Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Xiong, L., Xu, Z., and Shi, Y.Q. (2017). An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens. Syst. Signal Process.","DOI":"10.1007\/s11045-017-0497-5"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press.","DOI":"10.1017\/CBO9781139192903"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.sigpro.2016.05.032","article-title":"Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism","volume":"129","author":"Qin","year":"2016","journal-title":"Signal Process."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Manohar, K., and Kieu, T.D. (2017). An SMVQ-based reversible data hiding technique exploiting side match distortion. Multimed. Tools Appl.","DOI":"10.1007\/s11042-017-4814-7"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.dsp.2015.11.007","article-title":"A novel data-hiding and compression scheme based on block classification of SMVQ indices","volume":"51","author":"Chang","year":"2016","journal-title":"Dig. Signal Process."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","article-title":"Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing","volume":"53","author":"Parah","year":"2016","journal-title":"Dig. Signal Process."},{"key":"ref_23","first-page":"329","article-title":"Using a simple and fast image compression algorithm to hide secret information","volume":"28","author":"Chuang","year":"2006","journal-title":"Int. J. Comput. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1179\/136821910X12651933390629","article-title":"Steganography for BTC compressed images using no distortion technique","volume":"58","author":"Chen","year":"2010","journal-title":"Imaging Sci. J."},{"key":"ref_25","first-page":"733","article-title":"Steganography for block truncation coding compressed images using hybrid embedding scheme","volume":"7","author":"Hong","year":"2011","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","article-title":"High payload image steganography with minimum distortion based on absolute moment block truncation coding","volume":"74","author":"Ou","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","first-page":"1122","article-title":"A high payload steganographic scheme for compressed images with hamming code","volume":"18","author":"Bai","year":"2016","journal-title":"Int. J. Netw. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6159","DOI":"10.1007\/s11042-015-3208-y","article-title":"Hybrid secret hiding schemes based on absolute moment block truncation coding","volume":"76","author":"Huang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","article-title":"Ensemble classifiers for steganalysis of digital media","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Xu, X., Sun, Y., Tang, G., Chen, S., and Zhao, J. (2017, January 23\u201325). Deep learning on spatial rich model for steganalysis. Proceedings of the International Workshop on Digital Watermarking, Magdeburg, Germany.","DOI":"10.1007\/978-3-319-53465-7_42"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Couchot, J.F., Couturier, R., and Salomon, M. (2017, January 29\u201331). Improving blind steganalysis in spatial domain using a criterion to choose the appropriate steganalyzer between CNN and SRM + EC. Proceedings of the International Conference on ICT Systems Security and Privacy Protection, Rome, Italy.","DOI":"10.1007\/978-3-319-58469-0_22"},{"key":"ref_32","first-page":"435","article-title":"Coverless image steganography based on SIFT and BOF","volume":"18","author":"Yuan","year":"2017","journal-title":"J. Internet Technol."},{"key":"ref_33","first-page":"313","article-title":"Coverless information hiding method based on the Chinese character encoding","volume":"18","author":"Chen","year":"2017","journal-title":"J. Internet Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","article-title":"Absolute moment block truncation coding and its application to color image","volume":"32","author":"Lema","year":"1984","journal-title":"IEEE Trans. Commun."},{"key":"ref_35","unstructured":"(2017, December 30). The USC-SIPI Image Database. Available online: http:\/\/sipi.usc.edu\/database\/."},{"key":"ref_36","unstructured":"(2017, December 30). BOWS-2 Image Database. Available online: http:\/\/bows2.ec-lille.fr\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/2\/36\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:52:34Z","timestamp":1760194354000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/2\/36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,25]]},"references-count":36,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,2]]}},"alternative-id":["sym10020036"],"URL":"https:\/\/doi.org\/10.3390\/sym10020036","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2018,1,25]]}}}