{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:44:59Z","timestamp":1760197499022,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"New Star of Pearl River on Science and Technology of Guangzhou","award":["2014J2200085"],"award-info":[{"award-number":["2014J2200085"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61201393 and 61571139"],"award-info":[{"award-number":["61201393 and 61571139"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>This paper proposes a joint coding and reversible data hiding method for absolute moment block truncation coding (AMBTC) compressed images. Existing methods use a predictor to predict the quantization levels of AMBTC codes. Equal-length indicators, secret bits and prediction errors are concatenated to construct the output code stream. However, the quantization levels might not highly correlate with their neighbors for predictive coding, and the use of equal-length indicators might impede the coding efficiency. The proposed method uses reversible integer transform to represent the quantization levels by their means and differences, which is advantageous for predictive coding. Moreover, the prediction errors are better classified into symmetrical encoding cases using the adaptive classification technique. The length of indicators and the bits representing the prediction errors are properly assigned according to the classified results. Experiments show that the proposed method offers the lowest bitrate for a variety of images when compared with the existing state-of-the-art works.<\/jats:p>","DOI":"10.3390\/sym10070254","type":"journal-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T10:56:52Z","timestamp":1530529012000},"page":"254","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Joint Adaptive Coding and Reversible Data Hiding for AMBTC Compressed Images"],"prefix":"10.3390","volume":"10","author":[{"given":"Wien","family":"Hong","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, Nanfang College of Sun Yat-Sen University, Guangzhou 510970, China"}]},{"given":"Xiaoyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Nanfang College of Sun Yat-Sen University, Guangzhou 510970, China"}]},{"given":"Shaowei","family":"Weng","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Guangdong University of Technology, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","article-title":"A Novel Data Embedding Method Using Adaptive Pixel Pair Matching","volume":"7","author":"Hong","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Liu, Y., Chang, C.C., Huang, P.C., and Hsu, C.Y. (2018). Efficient Information Hiding Based on Theory of Numbers. Symmetry, 10.","DOI":"10.3390\/sym10010019"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Xie, X.Z., Lin, C.C., and Chang, C.C. (2018). Data Hiding Based on A Two-Layer Turtle Shell Matrix. Symmetry, 13.","DOI":"10.3390\/sym10020047"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","article-title":"Reversible Data Hiding Using Delaunay Triangulation and Selective Embedment","volume":"308","author":"Hong","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.image.2014.01.003","article-title":"A PVD-Based Data Hiding Method with Histogram Preserving Using Pixel Pair Matching","volume":"29","author":"Chen","year":"2014","journal-title":"Signal Process. Image Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/LSP.2017.2679043","article-title":"High-Fidelity Reversible Data Hiding Using Directionally-Enclosed Prediction","volume":"24","author":"Chen","year":"2017","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"9993","DOI":"10.1007\/s11042-016-3591-z","article-title":"An Efficient Reversible Data Hiding with Reduplicated Exploiting Modification Direction Using Image Interpolation and Edge Detection","volume":"76","author":"Lee","year":"2017","journal-title":"Multimedia Tools Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible Data Embedding Using a Difference Expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible Data Hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1179\/136821910X12651933390629","article-title":"Steganography for BTC Compressed Images Using No Distortion Technique","volume":"58","author":"Chen","year":"2010","journal-title":"Image Sci. J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.patcog.2008.11.040","article-title":"A Lossless Data Embedding Technique by Joint Neighboring Coding","volume":"42","author":"Chang","year":"2009","journal-title":"Pattern Recognit."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"13705","DOI":"10.1007\/s11042-015-2828-6","article-title":"A Reversible Steganographic Scheme for VQ Indices Based on Joint Neighboring and Predictive Coding","volume":"75","author":"Kieu","year":"2016","journal-title":"Multimedia Tools Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.ins.2014.08.057","article-title":"Reversible Data Hiding for VQ-Compressed Images Based on Search-Order Coding and Sate-Codebook Mapping","volume":"293","author":"Lin","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_14","first-page":"364","article-title":"A High-Payload Reversible Data Hiding Scheme Based on Histogram Modification in JPEG Bitstream","volume":"7","author":"Chang","year":"2016","journal-title":"Imaging Sci. J."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Hong, W. (2018). Efficient Data Hiding Based on Block Truncation Coding Using Pixel Pair Matching Technique. Symmetry, 10.","DOI":"10.3390\/sym10020036"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1587\/transcom.E96.B.624","article-title":"Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables","volume":"96","author":"Zhang","year":"2013","journal-title":"IEICE Trans. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","article-title":"High Performance Reversible Data Hiding for Block Truncation Coding Compressed Images","volume":"7","author":"Sun","year":"2013","journal-title":"Signal Image Video Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5441","DOI":"10.1007\/s11042-016-4032-8","article-title":"An Efficient Reversible Data Hiding Method for AMBTC Compressed Images","volume":"76","author":"Hong","year":"2017","journal-title":"Multimedia Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"9039","DOI":"10.1007\/s11042-017-4800-0","article-title":"A Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using Exclusive OR Operator","volume":"77","author":"Chang","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","article-title":"Absolute Moment Block Truncation Coding and Its Application to Color Image","volume":"32","author":"Lema","year":"1984","journal-title":"IEEE Trans. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4677","DOI":"10.1007\/s11042-017-4899-z","article-title":"An Efficient Authentication Method for AMBTC Compressed Images Using Adaptive Pixel Pair Matching","volume":"77","author":"Hong","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"12979","DOI":"10.1007\/s11042-017-4927-z","article-title":"On The Security of A BTC-Based-Compression Image Authentication Scheme","volume":"77","author":"Chen","year":"2017","journal-title":"Multimedia Tools Appl."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Malik, A., Sikka, G., and Verma, H.K. (2017). An AMBTC Compression Based Data Hiding Scheme Using Pixel Value Adjusting Strategy. Multidimensional Syst. Signal Process., 1\u201318.","DOI":"10.1007\/s11045-017-0530-8"},{"key":"ref_24","unstructured":"(2018, March 29). The USC-SIPI Image Database. Available online: http:\/\/sipi.usc.edu\/database."},{"key":"ref_25","unstructured":"(2018, March 29). BOWS-2 Image Database. Available online: http:\/\/bows2.gipsa-lab.inpg.fr."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/254\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:11:00Z","timestamp":1760195460000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":25,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,7]]}},"alternative-id":["sym10070254"],"URL":"https:\/\/doi.org\/10.3390\/sym10070254","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2018,7,2]]}}}