A Novel Scheme for Securing Image Steganography

  • Chin-Chen Chang
  • Jyh-Chiang Yeh
  • Ju-Yuan Hsiao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2195)


In this paper, we shall propose a more secure scheme with a larger embedding capacity for image steganography based on vector quantization and discrete cosine transform. Instead of encrypting the whole secret image, our method only encrypts the important features extracted from a secret image and then embeds the encrypted features into a cover image for producing a stego-image. During the work of data encryption and embedment, we introduce the data encryption standard cryptosystem and a pseudo random mechanism to ensure the security of the secret image. Besides, the distortion between the cover image and the stego-image is also imperceptible by the human eye, even when the size of the secret image is as large as that of the cover image. According to the substantial experimental results we shall give later, we can demonstrate the applicability of our method.


Cover Image Vector Quantization Image Encryption Secret Image Image Steganography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    R. Anderson, and F. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 471–478.CrossRefGoogle Scholar
  2. 2.
    Bourbakis, and C. Alexopoulos, “Picture data encryption using scan patterns,” Pattern Recognit., Vol. 25, 1992, pp. 567–581.CrossRefGoogle Scholar
  3. 3.
    Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM System Journal, Vol. 35, 1996, pp. 313–336.CrossRefGoogle Scholar
  4. 4.
    K. Chang, and J. L. Liou, “An image encryption scheme based on quadtree compression scheme,” Proc. Int. Computer Symp., Vol. 1, 1994, pp. 230–237.Google Scholar
  5. 5.
    Cziho, B. Solaiman, I. Lovanyi, G. Cazuguel, and C. Roux, “An optimization of finite-state vector quantization for image compression,” Signal Processing: Image Communication, Vol. 15, 2000, pp. 545–558.CrossRefGoogle Scholar
  6. 6.
    T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, October 1998, pp. 1485–1488.zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    J. J. Chae, and B. S. Manjunath, “A robust embedded data from wavelet coefficients,” Proc. SPIE-Int. Soc. Opt. Eng., Vol. 3312, 1998, pp. 308–317.Google Scholar
  8. 8.
    D. E. R. Denning, Cryptography and Data Security, Reading, MA: Addison-Wesley, 1983.Google Scholar
  9. 9.
    A. Gersho, and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers, Boston, 1992.zbMATHGoogle Scholar
  10. 10.
    C. J. Kuo, “Novel image encryption technique and its application in progressive transmission,” J. Electron. Imag., Vol. 2, 1993, pp. 345–351.CrossRefGoogle Scholar
  11. 11.
    L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, “Spread spectrum image steganography,” IEEE Transactions on Image Processing, Vol. 8, No. 8, August 1999, pp. 1075–1083.CrossRefGoogle Scholar
  12. 12.
    K. R. Rao, and P. Y ip, Discrete Cosine Transform-Algorithms, Advantages, Applications, Academic Press, 1990.Google Scholar
  13. 13.
    C. Schwartz, “A new graphical method for encryption of computer data,” Cryptologia, Vol. 15, 1991, pp. 43–46.CrossRefGoogle Scholar
  14. 14.
    D. C. Wu, and W. H. Tsai, “Spatial-domain image hiding using image differencing,” IEE Proc.-Vis. Image Signal Process., Vol. 147, No. 1, February 2000, pp. 29–37.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Chin-Chen Chang
    • 1
  • Jyh-Chiang Yeh
    • 1
  • Ju-Yuan Hsiao
    • 2
  1. 1.Department of Computer Science and Information EngineeringNational Chung Cheng UniversityChiayiTaiwan, R.O.C.
  2. 2.Department of Information ManagementNational Changhua University of EducationChanghuaR.O.C.

Personalised recommendations