Image Hiding Based Upon Vector Quantization Using AES Cryptosystem

  • Yanquan Chen
  • Tianding Chen
Part of the Lecture Notes in Control and Information Sciences book series (LNCIS, volume 345)


A novel gray-level image-hiding scheme is proposed. The goal of this scheme is to hide an important gray-level image into another meaningful gray-level image. The secret image to be protected is first compressed using the vector quantization (VQ) scheme. Then, the Advanced Encryption Standard (AES) cryptosystem is conducted on the VQ indices and related parameters to generate the encrypted message. Finally, the encrypted message is embedded into the rightmost two bits of each pixel in the cover image.


Watermark Scheme Advance Encryption Standard Secret Image Image Block Host Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R.J., Petitcolas, F. A. P.: On the Limits of Steganography, IEEE J.Selected Areas Commun. (1998)474–481Google Scholar
  2. 2.
    Artz., D.: Digital Steganography: Hiding Data within Data. IEEE Internet Comput.(2001) 75–80Google Scholar
  3. 3.
    Augot, D., Boucqueau, J.M., Delaigle, J.F., Fontaine, C., Goray, E.: Secure Delivery of Image over Open Networks, In Proc. IEEE 87(7) (1999)1251–1266CrossRefGoogle Scholar
  4. 4.
    Fu, M.S., Au. O.C.: Date Hiding Watermarking for Halftone Images. IEEE Trans. Imag. Process. 11(4)(2002)477–484CrossRefGoogle Scholar
  5. 5.
    Tseng, Y. C., Chen, Y. Y., Pan, H. K.: A Secure Data Hiding Scheme for Binary Images, IEEE Trans. Commun. 50(8) (2002) 1227–1231CrossRefGoogle Scholar
  6. 6.
    Tseng, Y. C., Pan, H. K.: Data Hiding in 2-color Images, IEEE Trans. Comput.51(7) (2002) 873–878MathSciNetCrossRefGoogle Scholar
  7. 7.
    Fu, M. S., Au, O. C.: Halftone Image Data Hiding with Intensity Selection and Connection Selection. Sign. Process: Imag. Commun. 16 (2001) 909–930CrossRefGoogle Scholar
  8. 8.
    Chang, C. C., Lin, M. H., Hu, Y. C.: A Fast and Secure Image Hiding Scheme Based on LSB Substation, Int. J. Pattern Recognition and Artificial Intelligence 16(4) (2002) 399–416CrossRefGoogle Scholar
  9. 9.
    Chang, C. C., Hu, Y. C.: A fast codebook training algorithm for vector quantization, IEEE Trans Consum. Electron.44(4)(1998) 1201–1208CrossRefGoogle Scholar
  10. 10.
    Fridrich, J., Goljan, M., Du. R.: Detecting LSB Steganography in Color and Grayscale Images. IEEE Multim.May.8(4) (2001) 22–28CrossRefGoogle Scholar
  11. 11.
    Hu, Y.C., Chang, C. C.: Apredictive Subcodebook Search Algorithm for Vector Quantization.Opt.Eng.39(6) (2000) 1489–1496CrossRefGoogle Scholar
  12. 12.
    Linde, Y., Buzo, A., Gray. R.M.: An Algorithm for Vector Quantizer Design. IEEE Trans.Commim.28(1980)84–95CrossRefGoogle Scholar
  13. 13.
    Rhee, M.Y.: Cryptography and Secure Communication. McGraw-Hill Book Co. Singapore. (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yanquan Chen
    • 1
  • Tianding Chen
    • 1
  1. 1.Institute of Communications and Information TechnologyZhejiang Gongshang UniversityHangzhou, ZhejiangChina

Personalised recommendations