Browse > Article
http://dx.doi.org/10.3745/JIPS.2010.6.4.435

Hiding Secret Data in an Image Using Codeword Imitation  

Wang, Zhi-Hui (Dept. of Software, Dalian University of Technology)
Chang, Chin-Chen (Dept. of Information Engineering and Computer Science, Feng Chia University)
Tsai, Pei-Yu (Dept. of Computer Science and Information Engineering, Chung Cheng University)
Publication Information
Journal of Information Processing Systems / v.6, no.4, 2010 , pp. 435-452 More about this Journal
Abstract
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to sort the codebook and to find two similar codewords of an image block. According to the secret to be embedded and the difference between those two similar codewords, the original image block is transformed into a difference number table. Finally, this table is compressed by entropy coding and sent to the receiver. The experimental results demonstrate that the proposed scheme can achieve greater hiding capacity, about five bits per index, with an acceptable bit rate. At the receiver end, after the compressed code has been decoded, the image can be recovered to a VQ compressed image.
Keywords
Data Hiding; Steganography; Vector Quantization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. C. Chang, T. S. Chen and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, Vol.141, No.1-2, 2002, pp.123-138.   DOI   ScienceOn
2 W. C. Du and W. J. Hsu, “Adaptive data hiding based on VQ compressed images,” IEE Proceedings on Vision, Image, and Signal Processing, Vol.150, No.4, 2003, pp.233-238.   DOI   ScienceOn
3 J. X. Wang and Z. M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, Vol.179, No.19, 2009, pp.3332-3348.   DOI   ScienceOn
4 C. C. Chang, T. D. Kieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, Vol.42, No.7, 2009, pp.1597-1603.   DOI   ScienceOn
5 C. C. Chang, C. Y. Lin and Y. Z. Wang, “New image steganographic methods using run-length approach,” Information Sciences, Vol.176, No.22, 2006, pp.3393-3408.   DOI   ScienceOn
6 B. Yang, Z. M. Lu and S. H. Sun, “Reversible watermarking in the VQ-compressed domain,” in: Proceedings of the Fifth International Conference on Visualization, Imaging, and Image Processing, Benidorm, Spain, 2005, pp.289-303.
7 C. C. Chang, T. D. Kieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, Vol.42, No.7, 2009, pp.1597-1603.   DOI   ScienceOn
8 Y. K. Lee and L. H. Chen, “High capacity image steganographic model,” IEE Proceedings-Vision, Image, and Signal Processing, Vol.147, No.3, 2000, pp.288-294.   DOI   ScienceOn
9 C. C. Chang, J. Y. Hsiao and C. S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, Vol.36, No.7, 2003, pp.1583-1595.   DOI   ScienceOn
10 J. Tian, “Wavelet-based reversible watermarking for authentication,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents IV, Vol.4675, January, 2002, pp.679-690.   DOI
11 J. Tian, “Reversible Watermarking by Difference Expansion,” Proc. of Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, December, 2002, pp.19-22.
12 Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” In Proc. of International Symposium on Circuits and Systems, Bangkok, Thailand, Vol.2, May, 2003, pp.912-915.   DOI
13 D. M. Thodi and J. J. Rodríguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. Image Process, Vol.16, No.3, 2007, pp.721-730.   DOI   ScienceOn
14 P. Tsai, Y. C. Hu and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol.89, Issue 6, June, 2009, pp.1129-1143.   DOI   ScienceOn
15 H. C. Wu, C. C. Lee, C. S. Tsai, Y. P. Chu, H. R. Chen, “A high capacity reversible data hiding scheme with edge prediction and difference expansion,” Journal of Systems and Software, In Press, Corrected Proof, Available online 11 July, 2009.   DOI
16 H. W. Tseng and C. P. Hsieh, “Prediction-based reversible data hiding.,” Information Sciences, Vol.179, No.14, 2009, pp.2460-2469.   DOI   ScienceOn
17 N. Ahmed, T. Natarajan and K. R. Rao, “Discrete cosine transform,” IEEE Transactions on Computers, Vol.C-23, 1974, pp.90-93.   DOI   ScienceOn
18 R. M. Gray and Y. Linde, “Vector quantization and predictive quantizers for Gauss-Markov sources,” IEEE Transactions on Communications, Vol.30, No.2, 1982, pp.381-389.   DOI
19 O. Rioul and P. Duhamel, “Fast algorithms for wavelet transforms,” IEEE Transaction on Information Theory, Vol.38, No.2, 1992, pp.569-586.   DOI   ScienceOn
20 C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol.177, No.13, 2007, pp.2768-2786.   DOI   ScienceOn
21 C. C. Chang and T. S. Chen, “A new tree-structured quantization with closest-coupled multipath searching method,” Optical Engineering, Vol.36, No.6, 1997, pp.1713-1720.   DOI   ScienceOn
22 C. C. Chang, D. C. Lin and T. S. Chen, “An improved VQ codebook search algorithm using principal component analysis,” Journal of Visual Communication and Image Representation, Vol.8, No.1, 1977, pp.27-127.   DOI   ScienceOn
23 Z. H. Wang, C. C. Chang, K. N. Chen and M. C. Li, “An encoding method for both image compression and data lossless information hiding,” The Journal of Systems and Software, Vol.83, No.11, 2010, pp.2073-2082.   DOI   ScienceOn
24 T. S. Chen, C. C. Chang, K. F. Hwang, Digital Image Processing, FLAG, ROC, 2006.
25 E. O. Brigham, “The fast Fourier transform,” Englewood Cliffs, NJ: Prentice-Hall, 1974.