Circuits, Systems & Signal Processing

, Volume 27, Issue 2, pp 137–153 | Cite as

A Novel High Capacity Reversible Information Hiding Scheme Based on Side-Match Prediction and Shortest Spanning Path

Digital Watermarking and Multimedia Security

Abstract

In recent years, information hiding techniques have attracted increased attention owing to the growing demand for the ability to exchange large amounts of information. In addition, hiding information in compressed messages is very practical in improving transmission efficiency and saving large amounts of storage space. However, the damage caused by hiding data in compressed messages reduces image quality more than the damage caused by hiding data in uncompressed messages. Hence, this paper proposes a data hiding scheme based on side-match prediction and declustering techniques for vector quantization (VQ) compressed images. The appropriate side-match prediction not only embeds secret information into the VQ index but also reverses the original compressed index. In addition, the capacity for secret information can be varied adaptively depending on the requirements of different applications. As experimental results indicate, the proposed scheme indeed outperforms previous work in hiding capacity and in the image quality of stego-images.

Keywords

Reversible information hiding Vector quantization Side-match prediction 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alattar, A. M., Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform, IEEE Transactions on Image Processing, 2004, 13(8):1147–1156. CrossRefMathSciNetGoogle Scholar
  2. 2.
    Chan, C. K., Cheng, L. M., Hiding Data in Images by Simple LSB Substitution, Pattern Recognition, 2003, 37:469–474. CrossRefGoogle Scholar
  3. 3.
    Chang, C. C., Lin, P. Y., A Compression Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis, Proceedings of the 2004 International Conference on Cyberworlds, Tokyo, Japan, 2004, 369–375. Google Scholar
  4. 4.
    Chang, C. C., Lu, T. C., Reversible Index-Domain Information Hiding Scheme Based on Side-Match Vector Quantization, The Journal of Systems and Software, 2006, 79:1120–1129. CrossRefGoogle Scholar
  5. 5.
    Chang, C. C., Hsiao, J. Y., Chung, L. Z., A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, 2002, 141(2):123–138. MATHCrossRefGoogle Scholar
  6. 6.
    Chang, C. C., Chen, G. M., Lin, M. H., Information Hiding Based on Search-Order Coding for VQ Indices, Pattern Recognition Letters, 2004, 25:1253–1261. CrossRefGoogle Scholar
  7. 7.
    Chen, T. S., Chang, C. C., A New Image Coding Algorithm Using Variable-Rate Side-Match Finite-State Vector Quantization, IEEE Transactions on Image Processing, 1997, 6(8):1185–1187. CrossRefGoogle Scholar
  8. 8.
    Chung, K. L., Shen, C. H., Chang, L. C., A Novel SVD- and VQ-Based Image Hiding Scheme, Pattern Recognition Letters, 2001, 22:1051–1058. MATHCrossRefGoogle Scholar
  9. 9.
    Du, W. C., Hsu, W. J., Adaptive Data Hiding Based on VQ Compressed Images, IEE Proceedings-Vision, Image and Signal Processing, 2003, 150(4):233–238. CrossRefGoogle Scholar
  10. 10.
    Kamstra, L., Heijmans, H. J. A. M., Reversible Data Embedding into Images Using Wavelet Techniques and Sorting, IEEE Transactions on Image Processing, 2005, 14(12):2082–2090. CrossRefGoogle Scholar
  11. 11.
    Kim, K., Side Match and Overlap Match Vector Quantizers for Images, IEEE Transactions on Image Processing, 1992, 1(2):170–185. CrossRefGoogle Scholar
  12. 12.
    Lee, R. C. T., Slagle, J. R., Mong, C. T., Towards Automatic Auditing of Records, IEEE Transactions on Software Engineering, 1978, SE-4(5):441–448. CrossRefGoogle Scholar
  13. 13.
    Li, S. L., Leung, K. C., Cheng, L. M., Chan, C. K., A Novel Image-Hiding Scheme Based on Block Difference, Pattern Recognition, 2005, 39:1168–1176. CrossRefGoogle Scholar
  14. 14.
    Linde, Y., Buzo, A., Gray, R. M., An Algorithm for Vector Quantizer Design, IEEE Transactions on Communications, 1980, 28(1):84–95. CrossRefGoogle Scholar
  15. 15.
    Ni, Z., Shi, Y. Q., Ansari, N., Su, W., Reversible Data Hiding, IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3):354–362. CrossRefGoogle Scholar
  16. 16.
    Shie, S. C., Lin, S. D., Fang, C. M., Adaptive Data Hiding Based on SMVQ Prediction, IEICE Transactions on Information and Systems, 2006, E89-D:358–362. CrossRefGoogle Scholar
  17. 17.
    Slagle, J. R., Chang, C. L., Heller, S., A Clustering and Data-Reorganization Algorithm, IEEE Transactions on Systems, Man and Cybernetics, 1975, 5:125–128. MATHGoogle Scholar
  18. 18.
    Wang, R. Z., Lin, C. F., Lin, J. C., Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 2001, 34:671–683. MATHCrossRefMathSciNetGoogle Scholar
  19. 19.
    Wu, M. N., Lin, C. C., Chang, C. C., Hiding Secret Information in VQ Compressed Images Using Voronoi Diagram, Proceedings of the 2nd International Symposium on Voronoi Diagrams in Science and Engineering, 2005, 55–61. Google Scholar

Copyright information

© Birkhäuser Boston 2008

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Chung Cheng UniversityChiayiTaiwan, ROC
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan, ROC

Personalised recommendations