Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 3, pp 3131–3151 | Cite as

A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks

  • Cheng-Ta Huang
  • Li-Chiun Lin
  • De-En Sun
  • Shiuh-Jeng WangEmail author
Article
  • 25 Downloads

Abstract

With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue to secure the confidentiality and integrity of data because the data are sent via the Internet as a primary method of communication. This paper proposes a steganographic method based on the vector quantization coding compression algorithm with elastic indicators, which also incorporates a keystream to enhance security. Our experimental results have shown that the proposed method performs more effectively compared to the method proposed by Lee et al. in 2013.

Keywords

Vector quantization Information hiding Image compression Huffman coding Elastic indicator 

Notes

Acknowledgments

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST 106-2221-E-015-001-, and Oriental Institute of Technology under the Grant 106-7-11-102.

References

  1. 1.
    Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156MathSciNetCrossRefGoogle Scholar
  2. 2.
    Al-Qershi OM, Khoo BE (2011) High capacity data hiding schemes for medical mages based on difference expansion. J Syst Softw 84(1):105–112CrossRefGoogle Scholar
  3. 3.
    Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(1):469–474CrossRefGoogle Scholar
  4. 4.
    Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circ Syst Video Technol 16(10):1301–1308CrossRefGoogle Scholar
  5. 5.
    Chen SK (2011) A module-based LSB substitution method with lossless secret data compression. Comput Stand Interfaces 33(4):367–371CrossRefGoogle Scholar
  6. 6.
    Hu YC (2006) High-capacity image hiding scheme based on vector quantization. Pattern Recogn 39(9):1715–1724CrossRefGoogle Scholar
  7. 7.
    Huang HY, Chang SH (2010) A lossless data hiding based on discrete Haar wavelet transform. IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 1554–1559Google Scholar
  8. 8.
    Huang CT, Wang WJ, Yang CH, Wang SJ (2013) A scheme of reversible information hiding based on SMVQ. Imaging Sci J 61(2):195–203CrossRefGoogle Scholar
  9. 9.
    Huffman D (1952) A method for the construction of minimum-redundancy codes. Proc IRE 40(9):1098–1101CrossRefGoogle Scholar
  10. 10.
    Lee JD, Chiou YH, Guo JM (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci 221(1):419–438CrossRefGoogle Scholar
  11. 11.
    Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85(10):2395–2404CrossRefGoogle Scholar
  12. 12.
    Linde Y, Bruzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95CrossRefGoogle Scholar
  13. 13.
    Pawar PH, Jondhale KC (2012) Histogram- based reversible data hiding using block division. IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACC CT), pp 295–299Google Scholar
  14. 14.
    Sencar HT, Ramkumar M, Akansu AN (2006) An overview of scalar quantization based data hiding methods. Signal Process 86(5):893–914CrossRefGoogle Scholar
  15. 15.
    Singh S, Siddiqui TJ, Singh R, Singh HV (2011) DCT-domain robust data hiding using chaotic sequence. 2011 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), pp 300–303Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Cheng-Ta Huang
    • 1
  • Li-Chiun Lin
    • 2
  • De-En Sun
    • 3
  • Shiuh-Jeng Wang
    • 2
    • 3
    Email author
  1. 1.Department of Information ManagementOriental Institute of TechnologyNew Taipei CityTaiwan
  2. 2.Information Cryptology Construction Laboratory, Department of Information ManagementCentral Police UniversityTaoyuanTaiwan
  3. 3.Department of Information ManagementCentral Police UniversityTaoyuanTaiwan

Personalised recommendations