DOI QR코드

DOI QR Code

Hiding Secret Data in an Image Using Codeword Imitation

  • Wang, Zhi-Hui (Dept. of Software, Dalian University of Technology) ;
  • Chang, Chin-Chen (Dept. of Information Engineering and Computer Science, Feng Chia University) ;
  • Tsai, Pei-Yu (Dept. of Computer Science and Information Engineering, Chung Cheng University)
  • Received : 2010.10.04
  • Accepted : 2010.10.05
  • Published : 2010.12.31

Abstract

This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to sort the codebook and to find two similar codewords of an image block. According to the secret to be embedded and the difference between those two similar codewords, the original image block is transformed into a difference number table. Finally, this table is compressed by entropy coding and sent to the receiver. The experimental results demonstrate that the proposed scheme can achieve greater hiding capacity, about five bits per index, with an acceptable bit rate. At the receiver end, after the compressed code has been decoded, the image can be recovered to a VQ compressed image.

Keywords

References

  1. J. Tian, “Wavelet-based reversible watermarking for authentication,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents IV, Vol.4675, January, 2002, pp.679-690. https://doi.org/10.1117/12.465329
  2. J. Tian, “Reversible Watermarking by Difference Expansion,” Proc. of Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, December, 2002, pp.19-22.
  3. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” In Proc. of International Symposium on Circuits and Systems, Bangkok, Thailand, Vol.2, May, 2003, pp.912-915. https://doi.org/10.1109/MWSCAS.2003.1562435
  4. D. M. Thodi and J. J. Rodríguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. Image Process, Vol.16, No.3, 2007, pp.721-730. https://doi.org/10.1109/TIP.2006.891046
  5. P. Tsai, Y. C. Hu and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol.89, Issue 6, June, 2009, pp.1129-1143. https://doi.org/10.1016/j.sigpro.2008.12.017
  6. H. C. Wu, C. C. Lee, C. S. Tsai, Y. P. Chu, H. R. Chen, “A high capacity reversible data hiding scheme with edge prediction and difference expansion,” Journal of Systems and Software, In Press, Corrected Proof, Available online 11 July, 2009. https://doi.org/10.1016/j.jss.2009.06.056
  7. H. W. Tseng and C. P. Hsieh, “Prediction-based reversible data hiding.,” Information Sciences, Vol.179, No.14, 2009, pp.2460-2469. https://doi.org/10.1016/j.ins.2009.03.014
  8. N. Ahmed, T. Natarajan and K. R. Rao, “Discrete cosine transform,” IEEE Transactions on Computers, Vol.C-23, 1974, pp.90-93. https://doi.org/10.1109/T-C.1974.223784
  9. O. Rioul and P. Duhamel, “Fast algorithms for wavelet transforms,” IEEE Transaction on Information Theory, Vol.38, No.2, 1992, pp.569-586. https://doi.org/10.1109/18.119724
  10. E. O. Brigham, “The fast Fourier transform,” Englewood Cliffs, NJ: Prentice-Hall, 1974.
  11. C. C. Chang, T. S. Chen and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, Vol.141, No.1-2, 2002, pp.123-138. https://doi.org/10.1016/S0020-0255(01)00194-3
  12. W. C. Du and W. J. Hsu, “Adaptive data hiding based on VQ compressed images,” IEE Proceedings on Vision, Image, and Signal Processing, Vol.150, No.4, 2003, pp.233-238. https://doi.org/10.1049/ip-vis:20030525
  13. J. X. Wang and Z. M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, Vol.179, No.19, 2009, pp.3332-3348. https://doi.org/10.1016/j.ins.2009.05.021
  14. C. C. Chang, T. D. Kieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, Vol.42, No.7, 2009, pp.1597-1603. https://doi.org/10.1016/j.patcog.2008.11.040
  15. C. C. Chang, C. Y. Lin and Y. Z. Wang, “New image steganographic methods using run-length approach,” Information Sciences, Vol.176, No.22, 2006, pp.3393-3408. https://doi.org/10.1016/j.ins.2006.02.008
  16. B. Yang, Z. M. Lu and S. H. Sun, “Reversible watermarking in the VQ-compressed domain,” in: Proceedings of the Fifth International Conference on Visualization, Imaging, and Image Processing, Benidorm, Spain, 2005, pp.289-303.
  17. C. C. Chang, T. D. Kieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, Vol.42, No.7, 2009, pp.1597-1603. https://doi.org/10.1016/j.patcog.2008.11.040
  18. Y. K. Lee and L. H. Chen, “High capacity image steganographic model,” IEE Proceedings-Vision, Image, and Signal Processing, Vol.147, No.3, 2000, pp.288-294. https://doi.org/10.1049/ip-vis:20000341
  19. C. C. Chang, J. Y. Hsiao and C. S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, Vol.36, No.7, 2003, pp.1583-1595. https://doi.org/10.1016/S0031-3203(02)00289-3
  20. C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol.177, No.13, 2007, pp.2768-2786. https://doi.org/10.1016/j.ins.2007.02.019
  21. R. M. Gray and Y. Linde, “Vector quantization and predictive quantizers for Gauss-Markov sources,” IEEE Transactions on Communications, Vol.30, No.2, 1982, pp.381-389. https://doi.org/10.1109/TCOM.1982.1095471
  22. C. C. Chang and T. S. Chen, “A new tree-structured quantization with closest-coupled multipath searching method,” Optical Engineering, Vol.36, No.6, 1997, pp.1713-1720. https://doi.org/10.1117/1.601197
  23. C. C. Chang, D. C. Lin and T. S. Chen, “An improved VQ codebook search algorithm using principal component analysis,” Journal of Visual Communication and Image Representation, Vol.8, No.1, 1977, pp.27-127. https://doi.org/10.1006/jvci.1997.0327
  24. Z. H. Wang, C. C. Chang, K. N. Chen and M. C. Li, “An encoding method for both image compression and data lossless information hiding,” The Journal of Systems and Software, Vol.83, No.11, 2010, pp.2073-2082. https://doi.org/10.1016/j.jss.2010.06.007
  25. T. S. Chen, C. C. Chang, K. F. Hwang, Digital Image Processing, FLAG, ROC, 2006.

Cited by

  1. Motion detection with pyramid structure of background model for intelligent surveillance systems vol.25, pp.7, 2012, https://doi.org/10.1016/j.engappai.2012.02.002
  2. Aspect ratio invariant visual cryptography by image filtering and resizing vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0535-0