Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy †

This study investigates combining the property of human vision system and a 2-phase data hiding strategy to improve the visual quality of data-embedded compressed images. The visual Internet of Things (IoT) is indispensable in smart cities, where different sources of visual data are collected for more efficient management. With the transmission through the public network, security issue becomes critical. Moreover, for the sake of increasing transmission efficiency, image compression is widely used. In order to respond to both needs, we present a novel data hiding scheme for image compression with Absolute Moment Block Truncation Coding (AMBTC). Embedding secure data in digital images has broad security uses, e.g., image authentication, prevention of forgery attacks, and intellectual property protection. The proposed method embeds data into an AMBTC block by two phases. In the intra-block embedding phase, a hidden function is proposed, where the five AMBTC parameters are extracted and manipulated to embed the secret data. In the inter-block embedding phase, the relevance of high mean and low mean values between adjacent blocks are exploited to embed additional secret data in a reversible way. Between these two embedding phases, a halftoning scheme called direct binary search is integrated to efficiently improve the image quality without changing the fixed parameters. The modulo operator is used for data extraction. The advantages of this study contain two aspects. First, data hiding is an essential area of research for increasing the IoT security. Second, hiding in compressed images instead of original images can improve the network transmission efficiency. The experimental results demonstrate the effectiveness and superiority of the proposed method.


Introduction
Rapid technological advances in network technology have made it possible to access large amounts of information on the Internet. However, the Internet environment is not secure enough for personal information to be stored safely. To ensure that personal information is not easily stolen or distributed maliciously, data hiding schemes are useful techniques for the Internet of Things (IoT) and visual IoT [1].
Due to the security problems of many image encryption schemes summarized in [2], data hiding is a critical area of research for increasing the security of the network information.
Nowadays, the data hiding technique has been investigated and published by many researchers. Data hiding is of two main kinds: reversible and irreversible. Reversible data hiding methods [3][4][5][6] emphasize that the original image can be recovered after data hiding. Thus, the images that require high detail information use reversible data hiding, such as mechanical drawing and medical imaging. However, to maintain the reversibility of the stego (i.e., the data-embedded) image, the amount of data that can be embedded will decrease or additional information would be required to recover from the stego image.
For irreversible data hiding [7,8], the least significant bit (LSB), exploiting modification directions (EMDs) and pixel value differencing (PVD) might be three of the most common techniques. The LSB method embeds binary secret data in the host image by replacing the LSB of the pixels to generate the stego image [9]. LSB is used because it can keep the minimal modification of the pixels while embedding data in the image. The EMD method embeds the (2n + 1) − ary digit data in n stego pixels, which at the most adjusts one of the stego pixels by increasing or decreasing its value by 1 (i.e., ±1) and leaving the rest unchanged [10]. The key advantage of EMD is that it decreases the number of pixels that need to be adjusted for data embedding; thus, it improves the quality of the stego image. The PVD method embeds the fixed size of data in the host image by adjusting the difference between the two pixels in pairs [11]. To reduce the modification between the two pixels in a pair that substantially decreases the quality of the stego image, the PVD method usually divides the pixel values into several sections of the same size. Although the irreversible data hiding technique cannot recover the stego image back to what it was, it usually does not need additional data for recovery and data extraction. In addition, the irreversible data hiding technique can achieve a higher hiding capacity. Therefore, in this paper, we propose the irreversible scheme. Figure 1 illustrates the application scenario (and the overall framework) of the proposed method. Nowadays, the data hiding technique has been investigated and published by many researchers. Data hiding is of two main kinds: reversible and irreversible. Reversible data hiding methods [3][4][5][6] emphasize that the original image can be recovered after data hiding. Thus, the images that require high detail information use reversible data hiding, such as mechanical drawing and medical imaging. However, to maintain the reversibility of the stego (i.e., the data-embedded) image, the amount of data that can be embedded will decrease or additional information would be required to recover from the stego image.
For irreversible data hiding [7,8], the least significant bit (LSB), exploiting modification directions (EMDs) and pixel value differencing (PVD) might be three of the most common techniques. The LSB method embeds binary secret data in the host image by replacing the LSB of the pixels to generate the stego image [9]. LSB is used because it can keep the minimal modification of the pixels while embedding data in the image. The EMD method embeds the (2 1) ary n   digit data in n stego pixels, which at the most adjusts one of the stego pixels by increasing or decreasing its value by 1 (i.e., ±1) and leaving the rest unchanged [10]. The key advantage of EMD is that it decreases the number of pixels that need to be adjusted for data embedding; thus, it improves the quality of the stego image. The PVD method embeds the fixed size of data in the host image by adjusting the difference between the two pixels in pairs [11]. To reduce the modification between the two pixels in a pair that substantially decreases the quality of the stego image, the PVD method usually divides the pixel values into several sections of the same size. Although the irreversible data hiding technique cannot recover the stego image back to what it was, it usually does not need additional data for recovery and data extraction. In addition, the irreversible data hiding technique can achieve a higher hiding capacity. Therefore, in this paper, we propose the irreversible scheme. Figure 1 illustrates the application scenario (and the overall framework) of the proposed method. Conceptual framework and the application scenario which illustrate the usage of the proposed method. In a smart city, the proposed method can perform data-hiding and compression jointly to increase the security level of visual sensing data.
Using the image data hiding techniques, we can embed secret data into an image to protect the owner's intellectual property and prevent abuse or tampering. Image data hiding is typically based on some specific image compression format [12][13][14][15][16]. When the image is compressed, it requires less memory for storage and is more efficient for transmission via the Internet. Image compression formats can be divided into lossy image compression and lossless image compression. Although lossy compression cannot recover the original image, it significantly reduces the image size, i.e., the compression rate performance of lossy compression is better than that of lossless compression. In this study, we use a lossy image compression method called absolute moment block truncation coding (AMBTC), to effectively compress the image. Conceptual framework and the application scenario which illustrate the usage of the proposed method. In a smart city, the proposed method can perform data-hiding and compression jointly to increase the security level of visual sensing data.
Using the image data hiding techniques, we can embed secret data into an image to protect the owner's intellectual property and prevent abuse or tampering. Image data hiding is typically based on some specific image compression format [12][13][14][15][16]. When the image is compressed, it requires less memory for storage and is more efficient for transmission via the Internet. Image compression formats can be divided into lossy image compression and lossless image compression. Although lossy compression cannot recover the original image, it significantly reduces the image size, i.e., the compression rate performance of lossy compression is better than that of lossless compression.
In this study, we use a lossy image compression method called absolute moment block truncation coding (AMBTC), to effectively compress the image.
The advantage of the AMBTC compression technique is that it requires quite low computation power and can still achieve an acceptable image quality. Therefore, it is suitable for low-energy devices. Recently, several researchers have investigated the AMBTC-based data hiding methods. Ou and Sun [17] proposed a steganography method that classifies the AMBTC blocks into smooth or complex blocks. In [17], two embedding schemes are designed according to the block type, which helps the authors to exploit the different block properties more efficiently. Tang et al. [18] proposed an adaptive image steganography method that uses the interpolation technique to improve the hiding performance. Lin et al. [19] proposed an image authentication method that also divides the AMBTC blocks into smooth or complex blocks. In smooth blocks, the authentication code is embedded into the bitmap, whereas in complex blocks, the authentication code is embedded to adjust the quantization levels using a reference table. Huang et al. [20] proposed a hybrid secret hiding scheme for data hiding in AMBTC images, in which, similar to [17] and [19], two types of blocks are classified. Then, data embedding in the complex blocks exploits the difference between high and low mean values of a block; therefore, it achieves a higher embedding capacity than the previous methods. Al-Salhi and Lu [21] presented an image concealment scheme that uses PVD techniques. Furthermore, the human visual system and adaptive neural networks are integrated to improve the image quality. Hong et al. [22] proposed an AMBTC-based data hiding method that uses a suppress threshold mechanism and a perturbation technique to minimize the block distortion in the stego image.
However, image quality image is inevitably degraded or a few image details are lost after compression by AMBTC and the data hiding procedure. Thus, this study adopts a halftone image optimization technology called Direct Binary Search (DBS). DBS is widely used instead of the heuristic approach to optimize halftone images by using a human visual system to minimize the total squared perceived error between a continuous tone image and a halftone image [23,24]. In this study, we adopt the Swap operator from the DBS framework and use this operator to optimize the stego image that is compressed and contains the hidden data. Using the Swap operator not only makes the stego image visually closer to the original image without affecting the hiding data, but also upgrades the image quality.

Related Work (AMBTC Compression)
As mentioned, AMBTC is a lossy image compression method which requires quite low computation power [25]. Therefore, AMBTC is suitable for real-time embedded system applications and can obtain a satisfactory compressed image quality. In AMBTC, the input image is first divided into non-overlapped square blocks with the side length of n (i.e., the block size BS equals to n). To compress the image, the average value of all the pixel values in each block is calculated by: where x i indicates the i-th pixel value of the block. The average pixel value is then used as a threshold to generate a n × n bit map by comparing x i with the pixel values in a block. For the case that x i is larger than the pixel value, the bit map value is set as 0 (later, it is replaced by the low mean value in the AMBTC compressed block) at the position; otherwise, it is set as 1 (replaced by the high mean value in the AMBTC compressed block). After comparison, the number of pixels whose pixel value is less than x i is referred as the number of low-mean bits (NL), and the number of pixels whose pixel value is larger than or equal to x i is referred as the number of high-mean bits (NH). For AMBTC compression, low mean and high mean are the two quantization levels calculated using the following: and Figure 2 shows an example of the AMBTC compression. Different from the original grayscale image block, in an AMBTC block, the pixel values are only two quantization levels (low mean and high mean), and thus it can save the memory for storage. In addition, the first absolute moment of each original image block is maintained.
(3) Figure 2 shows an example of the AMBTC compression. Different from the original grayscale image block, in an AMBTC block, the pixel values are only two quantization levels (low mean and high mean), and thus it can save the memory for storage. In addition, the first absolute moment of each original image block is maintained.

Intra-Block Embedding Phase
This study presents a 2-phase (intra-block and inter-block) data hiding strategy by manipulating AMBTC parameters. In the intra-block embedding phase, the hidden data are embedded into an AMBTC block by proper modification of the set containing five AMBTC parameters: where HM, LM, NH, NL, and BS indicate, respectively, high mean, low mean, number of high-mean bits, number of low-mean bits, and AMBTC block size. The hidden function is defined as: The secret bits to be embedded are converted to their decimal representation S . For example, 2 (11010) 26 S   in the case of 5-bit secret data. The goal of intra-block embedding is to adjust the parameters in  so that S is equal to the result obtained from the modulo operation: where n is the size of the secret bits embedded in a hidden function. Because the n-bit secret data are embedded by utilizing the modulo operation of H with the divisor 2 n , the simplest case occurs when mod( ,2 ) n H is equal to S (no adjustment is required

Intra-Block Embedding Phase
This study presents a 2-phase (intra-block and inter-block) data hiding strategy by manipulating AMBTC parameters. In the intra-block embedding phase, the hidden data are embedded into an AMBTC block by proper modification of the set containing five AMBTC parameters: where HM, LM, NH, NL, and BS indicate, respectively, high mean, low mean, number of high-mean bits, number of low-mean bits, and AMBTC block size. The hidden function is defined as: The secret bits to be embedded are converted to their decimal representation S. For example, S = (11010) 2 = 26 in the case of 5-bit secret data. The goal of intra-block embedding is to adjust the parameters in θ so that S is equal to the result obtained from the modulo operation: where n is the size of the secret bits embedded in a hidden function. Because the n-bit secret data are embedded by utilizing the modulo operation of H with the divisor 2 n , the simplest case occurs when mod(H, 2 n ) is equal to S (no adjustment is required). Otherwise, the difference between mod(H, 2 n ) and S must be eliminated by determining the embedding difference d such that S − mod(H + d, 2 n ) = 0. Two directions can be used to adjust the embedding difference: where sgn is the signum function. However, too many combinations of the parameters can lead to the result of (6) for the given secret data. It is difficult to find the optimal parameters efficiently.
To address this problem, the concept of nominal parameters is proposed. As shown in Table 1, three parameters (NH, NL, and BS) in θ are referred to as the "nominal parameters", which means that adjusting these three parameters in (6) does not change the actual information of an AMBTC block. Specifically, their actual value is maintained; however, when the hidden function value is calculated, the values of the three parameters are nominally changed, as the form of the trio code is changed. For example, when HM = 120, LM = 80, NH = 9, NL = 7, and BS = 4, the hidden function value is: However, if the form of the trio code is changed to (L i , H i , B i ), the hidden function value becomes:

Form of the Trio Code Change of the Nominal Parameters Change of the Hidden Function Value
Note that for embedding 5-bit secret data, which has 32 combinations, according to Table 1, if the bottom trio code is transmitted, the change in the resulting hidden function value designed to be 16 (i.e., 1 × 3 + 2 × 4 + 1 × 5), which is coincidentally half of 32. It will significantly reduce the search range and alleviate the effect of modifying θ to maintain image quality. Moreover, according to the rule listed in Table 1, two more directions can be used to adjust the embedding difference: and This work utilizes a two-step search approach to adjust the parameters HM and LM. In step 1, the final embedding difference d is selected from d 1 ∼ d 4 if it has the minimum absolute value, such that: In step 2, the parameters (HM, LM) are adjusted according to d, but the search constraints for the optimal HM (and LM) are set such that the variation of both must be less than a predefined threshold of six (an empirical value). Although using a larger threshold can expand the candidate pool of the eligible combinations, the quality of the stego image will degrade. By contrast, using a smaller threshold will limit the number of eligible combinations. For the combinations that pass the two-step search, the concept of mean square error (MSE) is used to determine the final parameters. The MSE value of a block can be expressed as follows: where I n is the pixel value of the original image block, and P n is the pixel value of the stego block.
The following example describes the data hiding (and the data extraction) of intra-block embedding procedure.
Assume that the original AMBTC parameters are θ = {HM = 120, LM = 80, NH = 7, NL = 9, BS = 4}, with H(θ) = 357, and the 5-bit secret data is S = (11010) 2 = 26. When (7) and (10) are applied, the four directions that can eliminate the difference between mod(H, 2 n ) and S are d 1 = 21, d 2 = −11, d 3 = 5, and d 4 = −27. In addition, according to (11), the final embedding difference is d = 5, in which the form of the trio code is (L i , H i , B i ). Six candidate pairs exist that increase the hidden function value by 5 and satisfy the search constraints: where the symbol "prime" indicates that the modification of parameters comes from the embedding of intra-block secret data. Finally, after the resulting MSE values of the six candidate pairs are compared, the candidate whose value corresponding with the minimum mean square error is selected.
Assume that the above fourth candidate pair is selected after comparing among the MSE values, and the stego AMBTC parameters become θ = {HM = 121, LM = 82, NH = 7, NL = 9, BS = 4}. In addition, the trio code is (L i , H i , B i ). At the receiving end, according to Table 1, the hidden function value is recalculated as 378. Then, the 5-bit secret code (11010) 2 can be extracted by using (6) and applying the decimal-to-binary conversion.

Quality Improvement Phase
In this subsection, we want to improve the quality of the stego image which comes from the intra-block embedding phase. Because the hidden data are embedded by adjusting the AMBTC parameters to certain fixed values that satisfies (6), the challenging part is: How to improve the image quality of current stego image without changing the AMBTC parameters used in (6)? To address this problem, this work applies a modified DBS optimization framework which only uses the swap operator. Using the DBS method enables us to take the human vision system (HVS) into account in the quality Improvement phase. Figure 3 shows the concept of DBS swap operator, and Figure 4 shows the concept of DBS method.  (7) and (10) candidate pairs exist that increase the hidden function value by 5 and satisfy the search constraints: where the symbol "prime" indicates that the modification of parameters comes from the embedding of intra-block secret data. Finally, after the resulting MSE values of the six candidate pairs are compared, the candidate whose value corresponding with the minimum mean square error is selected. Assume that the above fourth candidate pair is selected after comparing among the MSE values, and the stego AMBTC parameters become In addition, the trio code is ( , , ) At the receiving end, according to Table 1, the hidden function value is recalculated as 378. Then, the 5-bit secret code 2 (11010) can be extracted by using (6) and applying the decimal-to-binary conversion.

Quality Improvement Phase
In this subsection, we want to improve the quality of the stego image which comes from the intra-block embedding phase. Because the hidden data are embedded by adjusting the AMBTC parameters to certain fixed values that satisfies (6), the challenging part is: How to improve the image quality of current stego image without changing the AMBTC parameters used in (6)? To address this problem, this work applies a modified DBS optimization framework which only uses the swap operator. Using the DBS method enables us to take the human vision system (HVS) into account in the quality Improvement phase. Figure 3 shows the concept of DBS swap operator, and Figure 4 shows the concept of DBS method.   In this study, the perceived grayscale image ( g  ), the perceived stego AMBTC image ( h  ) and the perceived error image ( e  ) are defined, respectively, as DBS [23] is a pixel-based processing method which changes the regional 3 3  pattern centered at the current processing position iteratively. For the DBS swap operator, it swaps the current mean value with the mean value of its eight nearest neighbors and calculate the effects of all the trial changes. If an effect of trial change leads to the smallest error function, the corresponding trial swap is accepted. Furthermore, the DBS method introduces an autocorrelation function and a cross-correlation function to accelerate the computational efficiency. Because swapping the mean values between two adjacent pixel positions does not change the number of high-mean (low-mean) bits, the hidden function value is maintained, and the embedded data are preserved.

Reversible Inter-Block Embedding Phase
Inter-block embedding is performed on a pair of two adjacent blocks.  In this study, the perceived grayscale image ( g), the perceived stego AMBTC image ( h) and the perceived error image ( e) are defined, respectively, as e(x, y) = DBS [23] is a pixel-based processing method which changes the regional 3 × 3 pattern centered at the current processing position iteratively. For the DBS swap operator, it swaps the current mean value with the mean value of its eight nearest neighbors and calculate the effects of all the trial changes. If an effect of trial change leads to the smallest error function, the corresponding trial swap is accepted. Furthermore, the DBS method introduces an autocorrelation function and a cross-correlation function to accelerate the computational efficiency. Because swapping the mean values between two adjacent pixel positions does not change the number of high-mean (low-mean) bits, the hidden function value is maintained, and the embedded data are preserved.

Reversible Inter-Block Embedding Phase
Inter-block embedding is performed on a pair of two adjacent blocks. First, all the AMBTC blocks B are ordered and divided into two sets: even-order blocks B e and odd-order blocks B o : For a pair of (B e , B o ), the intra-block embedding of block B o is undertaken first. Subsequently, block B e is subject to the same intra-block embedding procedure; however, we add one more search constraint in the final step of determining (HM, LM), namely that both mean value differences between the two HM (and LM) values must be even numbers: DH = HM e − HM o is an even number DL = LM e − LM o is an even number , where HM e (LM e ) and HM o (LM o ) represent the high (low) mean values from the even-order block and the odd-order block, respectively. Sometimes, no candidate parameter pairs of block B e are found because of the constraints used. In this case, we compulsorily change the values of using the method shown in Figure 5. Note that, for the example shown in Figure 5, the value of HM is increased by 1; however, the hidden function value is unchanged (i.e., the secret data of the intra-block embedding are not damaged) because the values of (NH, NL) are modified accordingly. are found because of the constraints used. In this case, we compulsorily change the values of using the method shown in Figure 5. Note that, for the example shown in Figure 5, the value of HM is increased by 1; however, the hidden function value is unchanged (i.e.,, the secret data of the intra-block embedding are not damaged) because the values of ( , ) NH NL are modified accordingly.  Table 2, where the symbol "double prime" indicates that the modification of parameters comes from the embedding of inter-block secret data. In this work, we propose a reversible inter-block embedding scheme, meaning that, in the secret extraction phase, the change resulting from the interblock embedding procedure is reversible. Therefore, the quality of the stego image can be preserved to a certain extent. The following example describes the inter-block embedding and extraction procedures. Assume that the high (low) mean values of the block pair ( , )

Experimental Results and Discussions
For evaluation, the performance of the proposed method is compared with the recently published methods in [17] (2015), [20] (2017), and [22] (2017). Because medical images are essential By setting the constraint of even parity in (18) in advance, two extra secret bits can be embedded between blocks (B e , B o ) according to the rules in Table 2, where the symbol "double prime" indicates that the modification of parameters comes from the embedding of inter-block secret data. Table 2. Rule of inter-block embedding.

2-Bit Secret Code Change of the Mean Value Difference (DH, DL)
code 00 (DH, DL) is maintained code 01 (DH, DL + 1) as LM e = LM e + 1 code 10 (DH + 1, DL) as HM e = HM e + 1 code 11 (DH + 1, DL + 1) as HM e = HM e + 1 and LM e = LM e + 1 In this work, we propose a reversible inter-block embedding scheme, meaning that, in the secret extraction phase, the change resulting from the interblock embedding procedure is reversible. Therefore, the quality of the stego image can be preserved to a certain extent. The following example describes the inter-block embedding and extraction procedures.

Experimental Results and Discussions
For evaluation, the performance of the proposed method is compared with the recently published methods in [17] (2015), [20] (2017), and [22] (2017). Because medical images are essential sources of visual data in smart cities (for example, a smart home-based health care system which needs to transmit mass medical images for telemedicine), eight 400 × 400 test images are collected from the public database [25] (Figure 6).  (Figure 6). Moreover, for the methods in [17], [20], and [22], blocks are classified as smooth and complex blocks. Similarly, in our comparison, the concept in [17] is adopted to embed data into smooth blocks, and the proposed method is used to embed data into complex blocks. In addition to comparing the payload (i.e., data capacity in units of bits), this work adopts two image quality measures to fairly evaluate the performance of each method. The first quality measure is called HVS-based Peak Signal-to-Noise Ratio (HPSNR), which integrates the characteristics of HVS low-pass filter with the traditional Peak Signal-to-Noise Ratio (HPSNR). The HPSNR value can be expressed as follows; where ( , ) P Q indicates the image size, q indicates the HVS low-pass filter; where M is the number of SSIM local windows (set as 3 in this paper); j g and j h represent the image block within the j-th window, from the input grayscale image and the resulting stego AMBTC image, respectively. Table 3 shows the overall comparison of the four methods as the threshold value (for distinguishing smooth and complex blocks) is equal to 2. As shown in Table 3, because Moreover, for the methods in [17,20,22], blocks are classified as smooth and complex blocks. Similarly, in our comparison, the concept in [17] is adopted to embed data into smooth blocks, and the proposed method is used to embed data into complex blocks. In addition to comparing the payload (i.e., data capacity in units of bits), this work adopts two image quality measures to fairly evaluate the performance of each method. The first quality measure is called HVS-based Peak Signal-to-Noise Ratio (HPSNR), which integrates the characteristics of HVS low-pass filter with the traditional Peak Signal-to-Noise Ratio (HPSNR). The HPSNR value can be expressed as follows; where (P, Q) indicates the image size, q indicates the HVS low-pass filter; g i,j and h i,j indicate the pixels values of the input grayscale image and the resulting stego AMBTC image, respectively. The second quality measure is called Mean Structural Similarly Index Measure (MSSIM), which is an averaging result of multiple number of the traditional Structural Similarly Index Measure (SSIM). The MSSIM value can be expressed as: where M is the number of SSIM local windows (set as 3 in this paper); g j and h j represent the image block within the j-th window, from the input grayscale image and the resulting stego AMBTC image, respectively. Table 3 shows the overall comparison of the four methods as the threshold value (for distinguishing smooth and complex blocks) is equal to 2. As shown in Table 3, because most AMBTC blocks are classified as complex blocks due to the small threshold, the quality of stego AMBTC image using the proposed method achieves very satisfactory results. As shown in Table 3, because most AMBTC blocks are classified as complex blocks due to the small threshold, the quality of stego AMBTC image using the proposed method achieves very satisfactory results. It demonstrates that the proposed quality improvement phase is effective. Table 3. Overall comparison of the four methods (when the threshold value is 2).

Methods Metrics
Test Images   When a larger threshold value is applied, more blocks are classified smooth blocks. For the test image Matrix, embedding capacity for different methods is similar because the number of smooth blocks is considerably larger than that of complex blocks. However, the payload rows of Tables 3 and 4 show that the proposed method completely outperforms the other three methods in terms of embedding capacity. The results validate that the proposed intra-and interblock embedding schemes could utilize the property of the complex blocks to embed data. The comparison of the image quality reveals that the proposed method has higher HPSNR/MSSIM values than the methods in [17,20,22], which are also higher than those for some original AMBTC images. Furthermore, for the comparison of computational performance, the average processing times required to produce a stego image are 5.47 ms (in [17]), 6.11 ms (in [20]), 5.85 ms (in [22]), and 6.93 ms (in the proposed method). All the data hiding methods are implemented in the Windows 7 operating system, with 2.7 GHz CPU and 4 GB RAM. Although adding the modified DBS into the proposed data hiding method increases the processing time, the improvement of the image quality is remarkable.    Figure 7 presents a comparison of the variation of the usage of the thresholds of 2, 4, 8, 16, and 32 (using the test image Knee as an example). Because the pixel values in a smooth block are close to each other, the data capacity of a smooth block normally higher than that of a complex block. Thus, for all the methods, when the threshold is larger, more blocks are classified as smooth blocks, and larger average embedding capacity is yielded (Figure 6a). However, the quality of the stego image deteriorates accordingly (Figure 6b). The capacity of a pair of blocks in the proposed scheme is 12 bits, which is larger than the other three methods. Therefore, as the threshold increased from 32 to 2, capacity in the proposed scheme does not considerably decrease. The method in [20] exhibits maximum capacity when thresholds are 16 and 32 because in [20], the capacity of a complex block is given by 1 + log 2 Thr, where Thr indicates the threshold value. However, the image quality (HPSNR) of [20] abruptly decreases from Thr = 8 to Thr = 32. In contrast, in the proposed method, the image quality is maintained to a certain extent. Figure 7 presents a comparison of the variation of the usage of the thresholds of 2, 4, 8, 16, and 32 (using the test image Knee as an example). Because the pixel values in a smooth block are close to each other, the data capacity of a smooth block normally higher than that of a complex block. Thus, for all the methods, when the threshold is larger, more blocks are classified as smooth blocks, and larger average embedding capacity is yielded (Figure 6a). However, the quality of the stego image deteriorates accordingly (Figure 6b). The capacity of a pair of blocks in the proposed scheme is 12 bits, which is larger than the other three methods. Therefore, as the threshold increased from 32 to 2, capacity in the proposed scheme does not considerably decrease. The method in [20] exhibits maximum capacity when thresholds are 16 and 32 because in [20], the capacity of a complex block is given by   Figure 8, the threshold is set as 8 for all methods. Compared with the other methods, the proposed method exhibits clearer results in the central parts, and the color is closer to the original grayscale image. The rib area (the right red box) in Figure 8f shows that the proposed method preserves the required details of the original image. For the methods in [17], [20], and [22], the presence of block effects is observed, particularly in Figs. 8c and 8d because the data embedding is based on each AMBTC block. By contrast, in the proposed method, quality improvement phase successfully alleviates these unnatural effects.   Figure 8, the threshold is set as 8 for all methods. Compared with the other methods, the proposed method exhibits clearer results in the central parts, and the color is closer to the original grayscale image. The rib area (the right red box) in Figure 8f shows that the proposed method preserves the required details of the original image. For the methods in [17,20,22], the presence of block effects is observed, particularly in Figure 8c,d because the data embedding is based on each AMBTC block. By contrast, in the proposed method, quality improvement phase successfully alleviates these unnatural effects.   [20]. (e) Result of [22]. (f) Result of the proposed method. From (c) to (f), the threshold value is set as 8. Figures 9 and 10 show the self-evaluation results. Similar to Figure 7, the plot of embedding capacity versus image quality is analyzed. When the threshold is higher than 32, the overall capacity abruptly increases, and a considerable amount of secret data are embedded, which deteriorates image quality. Therefore, in both figures, the image quality curves obviously drop in the right side. However, for these eight test images, with the increasing capacity (under a larger threshold), the reduction in image quality is observed from 2 Thr  to 16 Thr  . We find that the declination in the curve is not evident within this range. This phenomenon occurs particularly in the images with  [20]. (e) Result of [22]. (f) Result of the proposed method. From (c) to (f), the threshold value is set as 8. Figures 9 and 10 show the self-evaluation results. Similar to Figure 7, the plot of embedding capacity versus image quality is analyzed. When the threshold is higher than 32, the overall capacity abruptly increases, and a considerable amount of secret data are embedded, which deteriorates image quality. Therefore, in both figures, the image quality curves obviously drop in the right side. However, for these eight test images, with the increasing capacity (under a larger threshold), the reduction in image quality is observed from Thr = 2 to Thr = 16. We find that the declination in the curve is not evident within this range. This phenomenon occurs particularly in the images with more flat regions, such as Matrix, Panoramix, and Phenix. Figure 11 shows the results of the proposed method using the test image Phenix (with different threshold values). more flat regions, such as Matrix, Panoramix, and Phenix. Figure 11 shows the results of the proposed method using the test image Phenix (with different threshold values).    Figure 11 shows the results of the proposed method using the test image Phenix (with different threshold values).     Finally, we compare the difference of whether using the inter-block embedding scheme. Figure 12 shows that both stego images have the same capacity with an average capacity of 6 bits per block. Figure 12a presents the application of both intra-and inter-block embedding schemes simultaneously, whereas Figure 12b shows the application of only the intra-block embedding scheme. In Figure 12a, 5-bit secret data are embedded by forcing the hidden function value to be one of 32 possibilities, and the other secret bit is embedded through reversible inter-block embedding. Figure 12b shows the embedding of 6-bit secret data embedded into one block. Thus, the hidden function value in Figure 12b becomes one of 64 possibilities (according to the uncontrolled and random secret data), which severely changes AMBTC parameters and causes image degradation. Although the image quality improvement phase is applied in both figures, the result shown in Figure 12a apparently demonstrates a more pleasing visual quality. Finally, we compare the difference of whether using the inter-block embedding scheme. Figure 12 shows that both stego images have the same capacity with an average capacity of 6 bits per block. Figure 12a presents the application of both intra-and inter-block embedding schemes simultaneously, whereas Figure 12b shows the application of only the intra-block embedding scheme. In Figure 12a, 5-bit secret data are embedded by forcing the hidden function value to be one of 32 possibilities, and the other secret bit is embedded through reversible inter-block embedding. Figure 12b shows the embedding of 6-bit secret data embedded into one block. Thus, the hidden function value in Figure 12b becomes one of 64 possibilities (according to the uncontrolled and random secret data), which severely changes AMBTC parameters and causes image degradation. Although the image quality improvement phase is applied in both figures, the result shown in Figure 12a apparently demonstrates a more pleasing visual quality.

Conclusions
In the era of network and IoT, data hiding becomes a critical research topic for increasing the security of image data transmitted among IoTs. In the past, "seeing is believing" may have been a disputable claim. Today, however, tampering or counterfeiting digital images using current technologies presents no difficulty. It raises a challenge of IoT security and, might, even obstruct the progress of the popularization of IoT. To address this problem, this study presents a data hiding method using the intra-and inter-block embedding strategy. By embedding additional verification code or security-related data in image signal transmission, data hiding technique is an effective solution to the security problem. Embedding data while maintaining good image quality is difficult because the hidden data are random and uncontrollable. Therefore, this work integrates the modified DBS optimization framework into data hiding. As it can be seen in Tables 3 and 4, the proposed method can embed averagely 121,792 (and 128,712) bits with the average HPSNR values 54.594 dB (and 53.989 dB), which validates the superiority of the proposed method. Compared with the state-of-the-art methods, the proposed method achieves better performance in terms of payload, HPSNR and MSSIM. In our next step, an extended framework about color image steganography is considered.

Conclusions
In the era of network and IoT, data hiding becomes a critical research topic for increasing the security of image data transmitted among IoTs. In the past, "seeing is believing" may have been a disputable claim. Today, however, tampering or counterfeiting digital images using current technologies presents no difficulty. It raises a challenge of IoT security and, might, even obstruct the progress of the popularization of IoT. To address this problem, this study presents a data hiding method using the intra-and inter-block embedding strategy. By embedding additional verification code or security-related data in image signal transmission, data hiding technique is an effective solution to the security problem. Embedding data while maintaining good image quality is difficult because the hidden data are random and uncontrollable. Therefore, this work integrates the modified DBS optimization framework into data hiding. As it can be seen in Tables 3 and 4, the proposed method can embed averagely 121,792 (and 128,712) bits with the average HPSNR values 54.594 dB (and 53.989 dB), which validates the superiority of the proposed method. Compared with the state-of-the-art methods, the proposed method achieves better performance in terms of payload, HPSNR and MSSIM. In our next step, an extended framework about color image steganography is considered.